Pulse CoderTop Dangerous & Destructive Linux CommandsAll of these commands are harmful to you. So use at your own risk. This is only for learning purposes.Sep 12Sep 12
Pulse CoderProgramming for Hackers Learning ModuleIn this Module, we discuss the programming language for hackers learning module. This is not for competitive programmer.Sep 1Sep 1
Pulse CoderProgramming for HackingProgramming is an important skill for hackers because it allows them to create custom tools and exploits to target specific systems or…Aug 19Aug 19
Pulse CoderBest Hacking Tools for Professionals Part 3Best Hacking Tools for Professionals Part 3Aug 12Aug 12
Pulse CoderBest Hacking Tools for Professionals Part 2Best Hacking Tools for Professionals Part 2Aug 1Aug 1
Pulse CoderBest Hacking Tools for Professionals Part 1Best Hacking Tools for Professionals Part 1Jul 26Jul 26
Pulse CoderInstall Metasploit in TermuxMetasploit is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS…Jun 26Jun 26
Pulse CoderTermux Tool — IP Tracer ToolIf we need information from an IP Address, we can use this tool.Jun 24Jun 24
Pulse CoderLinux Terminal Shortcuts Part 2Terminal is the most familiar term for Linux users. Linux Terminal Shortcuts are very useful since they prefer to do most of their work in…Apr 29Apr 29
Pulse CoderTryHackMe — Getting StartedGet started with TryHackMe by hacking a fake social media website!Apr 20Apr 20