Walid Salame

21 Added | 1 Magazine | @WalidSalamefafv | Keep up with Walid Salame on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Walid Salame”

Top Hacking Books

There is Growing demand for computer experts who can perform ethical hacking work due to the increased use of the Internet. However, it is not easy …

Information Security

Intercepter-NG

Intercepter-NG<p><b>Intercepter-NG v2.0 is an Android penetration testing app.</b><p>by using Intercepter-NG you will be able to intercept and analyze …

Fix Kali Linux sources.list Repositories

<b>Fix default repository</b><br>First after installing a clean Kali Linux the sources.list counte only tow repository and they are<p>if you try to do update it …

diamond 980000N usb Wifi Adapter

Diamond 980000N High Power Wireless Adapter USB Wifi lan card<p>Diamond 980000N High Gain Powerful 38DBI 3800mw is using ralink wireless rtl3070 …

Raspberry Pi

Linux Command Line Cheat Sheet

<b>The most essential Linux commands</b><p>Keep this Linux cheat sheet on your desk printed,<p>it will help you to learn them quick and become a Linux expert very …

Linux

Fix This kernel requires an x86-64 CPU detected an i686 CPU

<b>This kernel requires an x86-64 CPU, but only detected an i686 CPU.</b><p>Trying to install kali linux or ubuntu on Oracle VirtualBox or VMware ?<br>but when …

Linux

What is Darknet How to Access it

<b>Darknet</b><br>A Darknet is an overlay network that can only be accessed with specific software, configurations, or authorization, often using non-standard …

Privacy

aceVoip

<b>ACE VoIP Directory Tool</b><p>ACE (Automated Corporate Enumerator) is a simple yet powerful VoIP Corporate Directory enumeration tool that mimics the …

Information Security

acccheck

<b>acccheck Package Description</b><p>Acccheck Attempts to connect to the IPC and ADMIN shares depending on which flags have been chosen, and tries a …

Information Security

infernal twin Automated Evil Twin Attack

Automated Evil Twin Attack: infernal-twin<br>Evil twin is a term for a fake WiFi access point, it appears to be a legitimate one offered on the premises, …

Information Security

Install Kali Linux on Android Phone

<b>Kali Linux</b> is one the best love operating system of hackers, security researchers and pentesters. It offers advanced penetration testing tool and its …

Linux

How to Install VMware Tools in Kali Linux

In this tutorial, we will learn how to install vmware tools Kali linux.<br>There is many articles teach you how to install Open-VM-Tools but not the …

Linux

Exploit Android Using Kali Linux

<b>This is a tutorial explaining how to hack android phones with Kali Linux</b><p><b>YouTube Video Tutorial : Hack android phone and control webcam</b><p><b>Step 1:</b> Fire-Up …

Linux

vmware cannot change network to bridged

<b>vmware bridged network</b><p>So you Cannot change network to bridged: There are no un-bridged host network adapters.<p>First for those of you who don't know …

Linux

how to update Kali Linux and Fix update error

Kali Linux’s the great Penetration testing system is like any other system in the world it need to be updated,<br>Most of the update is not by Kali Linux …

Linux

install kali linux on usb

<b>make a kali linux bootable usb</b><p>having <b>kali linux live usb</b> is great Idea<br>having this great system with you wherever you go is the great idea we are …

Linux

Set Your Wi-Fi Card TX Power Higher Than 30 dBm

Do you have an Alfa AWUS036NH Wi-Fi adapter that claims it can go to 2000 mWs, or some card that can supposedly transmit power over 1000 mW? If so, …

Linux awk Command

Linux awk Command<p><b>what is awk Command</b> ?<br>The basic function of awk is to search files for lines (or other units of text) that contain a pattern. When a …

Useful Commands for Kali Linux

New to Kali Linux ? or to Linux world at all ...<br>welcome to this new experience i'm sure you will enjoy once you start to try ...<br>and why not to try …

alias Kali Linux command

Linux Command Alias<p>Most Linux users are well versed in the typing out of lengthy commands in the Terminal. They're especially hardened and generally …

apt-get command

and If you don’t want to remove the configuration files, simply leave out the “--purge” command,<br>example<p>6) <b>apt get reinstall</b> <br>You can reinstall a …