What is Phishing?
Phishing, as its name suggests, is literally information fishing. When we talk about a cyber [...]
May
What is Ngrok and How to Install It?
Ngrok is a service or tool that allows you to turn your local server into [...]
May
What is Setoolkit?
Setoolkit or SET is an open-source framework for performing pentesting focused on Social Engineering attacks. [...]
May
Ngrok + Setoolkit Kali Linux 2020 – Phishing Attack
In this tutorial, I’m going to explain how to do phishing. But before that, I [...]
May
How to Install Kali Linux on Mac 2020
First of all, we need to make sure that Virtual Box for Mac is installed, [...]
May
Change Your Router Password
If I had to give you only one cybersecurity tip, it would definitely be this: [...]
May
Tutorial #1: Create a Local Variable on Your System
For macOS or Linux: Step 1: Open the Terminal. Step 2: Determine which shell you [...]
May
Setting Up an Environment Variable in AWS Elastic Beanstalk
Step 1: Access Elastic Beanstalk Log in to your AWS console and navigate to Elastic [...]
May
Sign Language Translator
The sign language translator created by Priyanjali Gupta — How was it made? She is [...]
May
Do You Read a Lot on the Internet?
If you read a lot on the internet, in this blog I’m going to give [...]
May