Unlocking the Xiaomi Booloader

Before proceeding, ask yourself what is a Xioami bootloader? This block is programmed by Xiaomi to prevent third-party retailers from installing ROMs that could potentially be harmful to Xiaomi smartphone …

Best Linux for hacking

Best Linux for hacking

Linux is the preferred OS of choice for hackers around the world. There are several reasons for this: Precise control – Linux provides complete control to the user over every …

Short tips F.A.Q

How to set multiple IP targets in Metasploit? to set up multiple IP targets, enter inside Metasploit:“set RHOSTS 00.11.22.33-00.00.11.22”

zydra turorial

Crack passwords using Zydra turorial

Files with sensitive information are often encrypted. These include password protected PDF and ZIP files, Linux shadow files that contain passwords that are encrypted and so on. Different tools use …

file password cracking

CRACK PASSWORD PRTECTED FILES EASY

Nowadays sensitive information in PDF or ZIP files are often password protected. This includes bank account statements, medical records, salary statements and so on. Password protection algorithms differ based on …