How to Create a Dev Environment in Windows 10: Part 1

How to Create a Dev Environment in Windows 10: Part 1

Gone are the days Linux and Mac were the go to for development. Microsoft has leveled the playing field with WSL2. Today i would like to help you create a dev/hacking environment in Windows 10. So let's get started

Resources for Building a Beautiful Progressive JAMstack Blog

Resources for Building a Beautiful Progressive JAMstack Blog

Hey guys? Today i'll be sharing the tools i used to build this beautiful progressive JAMstack blog.

Building a Beautiful Progressive JAMstack Blog Part 2: Day 4 to 7

Building a Beautiful Progressive JAMstack Blog Part 2: Day 4 to 7

Hey guys? Welcome to Part 2 of building the beautiful, fast, SEO optimized, progressive JAMstack blog.

Building a Beautiful Progressive JAMstack Blog Part 1: Day 1 to 3

Building a Beautiful Progressive JAMstack Blog Part 1: Day 1 to 3

Hey guys? Today we will be building a beautiful, fast, SEO optimized, progressive JAMstack blog for free. Step by step.

The 8 Phases of Cyber Security Testing

The 8 Phases of Cyber Security Testing

Unlike the previous post: The 5 Phases Of Hacking. This procedure mostly resonates with cybersecurity professionals and/or ethical hackers

10 Anonymity Rules

10 Anonymity Rules

10 Simple Anonymity Rules and Tips to Follow

The 5 Phases of Hacking

The 5 Phases of Hacking

Learn the 5 phases of hacking which is used when hacking into systems.

10 Internet Safety Rules

10 Internet Safety Rules

10 Simple Internet Safety Rules and Tips

Kali NetHunter for Android No Root

Kali NetHunter for Android No Root

Offensive Security recently released Kali Nethunter for Unrooted/Nonrooted Android Device.

Young Kenyan Hackers Targeting Banks

Young Kenyan Hackers Targeting Banks

A look into why young techies are turning into hackers and are targeting financial organizations


Subscibe & get notified about new content

The email you entered is not valid.