techyrick

  • Facebook
  • Twitter
  • Google Plus
  • Hacking tools
    • Information gathering
    • Network mapping
    • Vulnerability analysis
    • Web application vulnerability
    • Password cracking
    • Wireless attack
    • Sniffing & Spoofing
    • Exploitation tools
    • Reverse Engineering
    • Social Engineering
  • Home
  • Blog
  • Contact
  • CTF
    • OTW
    • VulnHub
    • HTB
    • PicoCTF
  • Others
    • Linux
    • Malware
    • Bug Bounty Writeups
    • Programming
      • Python Hackers
    • Windows Privilege Escalation
    • Network Service Pentesting

Tag - Linux

part 8 linux commands

Basic Linux Commands for Hackers | Part 8

10 May 2023
by moulik
2 min read

Table of ContentsIntroductionVideoLet's start ????Your First Bash ScriptScanner using ScriptConclusion Introduction In the previous post, You must have learned about some of the basic commands related to process...

Continue reading

basic linux command part 7

Basic Linux Commands for Hackers | Part 7

28 April 2023
by moulik
2 min read

Table of ContentsIntroductionVideoLet's start ????Your First Bash ScriptScanner using ScriptConclusion Introduction In the previous post, You must have learned about some of the basic commands related to permissions...

Continue reading

linux cmd part 6

Basic Linux Commands for Hackers | Part 6

16 April 2023
by moulik
2 min read

Table of ContentsIntroductionVideoLet's start ????Your First Bash ScriptScanner using ScriptConclusion Introduction In this post, You will learn how to control file and directory permissions in kali linux. If you have...

Continue reading

basic linux commands part 5

Basic Linux Commands for Hackers | Part 5

5 April 2023
by moulik
3 min read

Table of ContentsIntroductionVideoLet's start ????Your First Bash ScriptScanner using ScriptConclusion Introduction In this post, Let’s see how to add and remove software in Linux. This is going to be really...

Continue reading

linux command part4

Basic Linux Commands for Hackers | Part 4

1 April 2023
by moulik
3 min read

Table of ContentsIntroductionVideoLet's start ????Your First Bash ScriptScanner using ScriptConclusion Introduction ???????? In this post, you will learn some basic network analysing and managing commands. If you have...

Continue reading

linux commands part 3

Basic Linux Commands for Hackers | Part 3

28 March 2023
by moulik
2 min read

Table of ContentsIntroductionVideoLet's start ????Your First Bash ScriptScanner using ScriptConclusion Introduction???????? In this post, You will learn some of the important Linux commands. Hope you have seen the...

Continue reading

Basic Linux Commands for Hackers | Part 2

27 March 2023
by moulik
3 min read

Table of ContentsIntroductionVideoLet's start ????Your First Bash ScriptScanner using ScriptConclusion Introduction In this post, You will learn basic Linux commands. You can start your hacking journey from...

Continue reading

linux commands for hackers part 1

Basic Linux Commands for Hackers | Part 1

23 March 2023
by moulik
3 min read

Table of ContentsIntroductionVideoLet's start ????Your First Bash ScriptScanner using ScriptConclusion Introduction In this post, You will learn basic Linux commands. You can start your hacking journey from here...

Continue reading

fixed error

Error while opening the virtual machine: VMX file is corrupt. Fixed 2024

18 October 2021
by moulik
2 min read

Introduction In this post, we will see a VMware error occurring while opening any vmdk file. By end of this post, you will be able to solve this error, Error while opening the virtual machine: VMX file is corrupt. Video:...

Continue reading

Previous 1 2 3 Next

Contact Us

Need help or have a question?
Contact us at: techyrick.com@gmail.com

Copyright © 2025. Created by Meks. Powered by WordPress.
  • Hacking tools
    • Information gathering
    • Network mapping
    • Vulnerability analysis
    • Web application vulnerability
    • Password cracking
    • Wireless attack
    • Sniffing & Spoofing
    • Exploitation tools
    • Reverse Engineering
    • Social Engineering
  • Home
  • Blog
  • Contact
  • CTF
    • OTW
    • VulnHub
    • HTB
    • PicoCTF
  • Others
    • Linux
    • Malware
    • Bug Bounty Writeups
    • Programming
      • Python Hackers
    • Windows Privilege Escalation
    • Network Service Pentesting
  • Facebook
  • Twitter
  • Google Plus