Recently Updated Pages
Weechat - with Bouncer
Join a server /server add BNC my.bouncer.net/6697 -ssl -username=username/network -password=passw...
Create Jail, Networking and NAT
Step 1: Enable IP Forwarding First, you need to enable IP forwarding on your FreeBSD host. This a...
First Steps
Add User To system root@balrock:~ # adduser Username: username Full name: Uid (Leave empty for d...
Upgrade FreeBSD
Upgrading FreeBSD from one minor version to another, such as from FreeBSD 14.0 to 14.2, can typic...
Change Hostname
Changing the hostname in FreeBSD can be done in a few simple steps. Here’s how to do it: Step 1: ...
Webdav using Apache2
Step 1: Install Required Packages First, ensure that you have Apache2 and the necessary modules i...
Radicale - Cal and CardDav
1. Install Packages apt update apt dist-upgrade apt install radicale apache2-utils 2. Authentica...
apt-mirror
Download neccessary packages apt install apt-mirror dpkg-dev apache2 Edit your /etc/apt/mirror.l...
Reset Local Windows 10 Password (german)
Startet euren Rechner mit dem Windows 10-Installationsmedium und klickt im Begrüßungsbildschirm...
Autostart VM on Boot
In this guide, we are going to learn how to autostart VirtualBox VMs on system boot on Linux. On ...
wget
Mirror whole Web-Pages via wget wget -mkEpnp -e robots=off --convert-links Download only .mp3 f...
Skip Twitters Ratelimiting
Mitigating Unauthorized Web Scraping Bot Traffic The current design of Nitter, along with its met...
[need review] Stable Diffusion AMD Debian ROCm
I assume you already have Docker installed Create Stable Diffusion Folder ROCm mkdir SD cd SD Cl...
Alpaca Electron
Alpaca Electron Alpaca Electron is built f...
Stable Diffusion AMD Linux ROCm
This repository contains instructions on how to host your own AI for image generation using stabl...
Part 1: Prerequisites
Before we begin, let's install some necessary packages: sudo apt install libvirt-daemon-system li...
9. Practice
I am assuming you already have Monitor Mode active We want to check all the networks which have W...
8. WPA and WPA2 Cracking
Both, WPA and WPA2 can be cracked using the same methods. They are made ti adress the issues in W...
7. WEP Cracking
If the Network isn't busy we need to force the AccessPoint to generate new packages. We are doing...
6. Fake Authentication Attack
Why do we the fake Auth? APs can only communicate with connected Clients If we aren't connected,...