The best source of security information online

Latest articles

install and use python on kali linux

Python on Kali Linux: A beginner’s guide to get started

Python is now the most used programming language in the world, with usage ranging from artificial intelligence to web development or even smartphone applications. For hackers and pen-testers, Python can also become a great ally on Kali Linux, to save time on many processes. Let’s see how to install and…
how to take screenshots on kali linux

Kali Linux: How to Capture Screenshots Like a Pro

Taking screenshots is a common task you need to master, but when you are using a new system (like Kali Linux), you don’t necessarily know all the tips and tricks. Modern desktop environments have a nice tool to take screenshots, but you can also find even better solutions in the…
install and use wifite on kali linux

Wifite: A step-by-step guide for Kali Linux users

Cracking Wi-Fi networks is one of the main use of the Kali Linux toolkit, and it has always been. I remember playing Aircrack-NG when I was at school, many years ago. The process was a bit complicated, but hopefully, it’s now easier than ever, thanks to a new tool: Wifite….
does kali linux have a vpn

Does Kali Linux have a VPN client? (Get one for free)

Kali Linux is often described as the security toolkit for hackers and pen-testers, so making sure we aren’t discovered too quickly by security systems can be important. Let’s talk about VPN today (Virtual Private Network) and whether or not Kali includes one by default. When installed with the default tools,…
connect wifi on kali linux

How To Connect Wi-Fi On Kali Linux (GUI, Command, Hidden, …)

Connecting to a Wi-Fi network on Kali Linux is often an important step, especially if you keep the Ethernet connection free for other purposes (or don’t have other choice). Anyway, whether you try to connect to the Wi-Fi during the installation, via the GUI or in command line, this guide…

How To Easily Create MD5 Hashes In JavaScript?

Even if it seems like JavaScript has been around forever, generating an MD5 hash with it is not a built-in feature. Today, I’ll show you how you can create MD5 hashes in your JavaScript code. The easiest way to generate a MD5 hash with JavaScript is to use an external…

Recommended reading

How To Install Hashcat on Windows In 2023

Hashcat is my favorite password cracker. You can use it on any operating system or distribution, but it’s often easier to use Windows to avoid drivers issues (especially with a recent GPU). Anyway, I will explain how to install it on Windows in this tutorial. Hashcat is officially supported on Windows, binaries files can be downloaded on the official website…
how to use hashcat md5

How To Install Hashcat On Ubuntu In 2023

Hashcat is an important tool to have in your tool belt (on your computer at least ^^). I already wrote several tutorials on how to use Hashcat, but today we’ll stay focus on the installation, especially on a Linux distribution like Ubuntu. The easiest way to install Hashcat on Ubuntu is to use the package manager (APT), as Hashcat is…
md5 vs sha256 which is better

MD5 vs SHA256: Which is Better? (Speed, Safety, …)

MD5 and SHA256 are two popular cryptographic algorithms, used to store sensitive data (passwords for example). In this article, we’ll see the difference between them, and which one you should use and why. As a whole, SHA-256 is better than MD5 because the output size is twice longer and the probability of collisions is lower. SHA-256 is a bit slower…
decrypt md5 password python

How to Decrypt MD5 Passwords in Python?

The big question many beginners have about MD5 is how to decrypt hashes after encryption.In this post, I’ll explain you this, and specifically, how to do this in Python. How to Decrypt MD5 Passwords in Python?The MD5 cryptographic algorithm is not reversible.A word can be encrypted into MD5, but it’s not possible to create the reverse function to decrypt a…
difference-md5-sha1

What’s The Difference Between MD5 And SHA1?

MD5 and SHA1 are often used following a random pick by the developer, but it’s not the same thingIn this post, I’ll introduce these two solutions and explain how they differ. The main difference between SHA1 and MD5 is that MD5 produces a 32-character message digest, while SHA1 produces a 40-character hexadecimal. Also, the MD5 algorithm is faster than SHA1,…

How MD5 Decryption Works?

MD5 stands for “Message Digest 5 algorithm” and is a well-known cryptographic hash function.They designed this function to make it impossible to decrypt, but today, it’s not yet the case …With the growth of computing and storage through years, we can now use these tools to decrypt a lot of MD5 hash. As there is no reverse function to decrypt a…