Skip to main content

Recently Updated Pages

Autostart VM on Boot

Virtualbox

In this guide, we are going to learn how to autostart VirtualBox VMs on system boot on Linux. On ...

Updated 7 months ago by tinfoil-hat

wget

wget

Mirror whole Web-Pages via wget wget -mkEpnp -e robots=off --convert-links Download only .mp3 f...

Updated 7 months ago by tinfoil-hat

Skip Twitters Ratelimiting

Nitter server - Pass Rate Limiting

Mitigating Unauthorized Web Scraping Bot Traffic The current design of Nitter, along with its met...

Updated 7 months ago by tinfoil-hat

New Page

Local Apt-Mirror

How do make a local debian apt mirror To create a local Debian APT mirror, you can follow these g...

Updated 7 months ago by tinfoil-hat

[need review] Stable Diffusion AMD Debian ROCm

Stable Diffusion AMD - rocm Debian

I assume you already have Docker installed Create Stable Diffusion Folder ROCm mkdir SD cd SD Cl...

Updated 8 months ago by tinfoil-hat

Alpaca Electron

Alpaca LLAMA

Alpaca Electron Alpaca Electron is built f...

Updated 11 months ago by tinfoil-hat

Stable Diffusion AMD Linux ROCm

Stable diffusion

This repository contains instructions on how to host your own AI for image generation using stabl...

Updated 11 months ago by tinfoil-hat

Part 1: Prerequisites

How - To GPU - Passtrough

Before we begin, let's install some necessary packages: sudo apt install libvirt-daemon-system li...

Updated 1 year ago by tinfoil-hat

9. Practice

wireless

I am assuming you already have Monitor Mode active We want to check all the networks which have W...

Updated 1 year ago by tinfoil-hat

8. WPA and WPA2 Cracking

wireless

Both, WPA and WPA2 can be cracked using the same methods. They are made ti adress the issues in W...

Updated 1 year ago by tinfoil-hat

7. WEP Cracking

wireless

If the Network isn't busy we need to force the AccessPoint to generate new packages. We are doing...

Updated 1 year ago by tinfoil-hat

6. Fake Authentication Attack

wireless

Why do we the fake Auth? APs can only communicate with connected Clients If we aren't connected,...

Updated 1 year ago by tinfoil-hat

5. Gaining Access - WEP Cracking

wireless

Basics WEP means: Wired Equvalent Privacy It's an old encryption Uses an algorythm called RC4 S...

Updated 1 year ago by tinfoil-hat

4. Targeted Packet Sniffing

wireless

After scanning via airodump-ng you get like previous stated a similar output like this: Pic a ta...

Updated 1 year ago by tinfoil-hat

3. WiFi Bands and Frequencies

wireless

Now I'd like to talk about WiFi Bands. The Band defines what frequencies it uses to broadcast the...

Updated 1 year ago by tinfoil-hat

2. Pre Connection Attacks

wireless

I am assuming you already did this: >>you need to prepare your network card like here<< Scan Netw...

Updated 1 year ago by tinfoil-hat

1. Monitor Mode & Randomized MAC

wireless

Check Network Adapters iwconfig Cofigure Monitor Mode Standard Mode should be Mode:Managed and P...

Updated 1 year ago by tinfoil-hat

New Page

dd

Fill disks with zeroes dd if=/dev/zero bs=1M of=/dev/sda status=progress Fill disks with random ...

Updated 1 year ago by tinfoil-hat

Create and restore apt-package-list

Debian

you can use this list for example to install all your apt packages on another machine, for exampl...

Updated 1 year ago by tinfoil-hat

GPU Passtrough on Linuxmint 21

My Linux Mint Setup

0: Pretext This Setup requires 2 Graphic Cards (1ntegrated and one internal PCI Graphicscard - or...

Updated 1 year ago by tinfoil-hat