Subscribe to:
Post Comments (Atom)
Popular Posts
-
NIDS – Network Intrusion Detection System • It Uses a network tap, span port, or hub to collect packets on the network • Attempts t...
-
Target Specification 192. 168. 100. 1-50 IP Range 192. 168. 100. 1/24 CIDR Spec. -iL Filename IP Addr File -iR...
-
HIDE FOLDER Hide : attrib +h +r +s C:\Users\username\demo Unhide : attrib -h -r -s C:\Users\username\demo SEE HIDDEN ...
-
WINDOWS 8.1 PRIVILEGE ESCALATION BY BYPASSING UAC PHYSICALLY This tool works as you can see in the picture in win 8.1, but it's li...
-
cd cd ~ go to home dir cd ~username go to user home dir cd - go to last dir cd ./ ...
-
Hardware security is vulnerability protection that comes in the form of a physical device rather than software that is installed on the ...
-
DISABLE Reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /...
No comments:
Post a Comment