Ansh Balanlinuxfordevops.hashnode.dev·5 hours agoPart 5: Memory Commands, While Loop, and Vim CommandIn this section, we will explore memory management commands, while loops, the Vim text editor, and more. We’ll also create a shell script that ties everything together to monitor disk space. Important Memory Commands 1. free Command The free command ...DiscussDevops
Ronald Bartelshubandspoke.amastelek.com·Jul 23, 2024🖥️Network Tools | btop - the Best System Monitoring Tool to use on a SD-WAN edge🔍I've previously used bpytop but its there is its cousin btop that is more slim and trim, the member of the family thats been to the gym. Here is how to install it: wget -qO btop.tbz https://github.com/aristocratos/btop/releases/latest/download/btop-x...Discuss·1 likebtop
Anirudh Singh Bhadauriaanirudhbhadauria.hashnode.dev·Feb 26, 2024Vim Commands 101 🖖🏻Inside a block keys - ActionCommand yank inside " " / () / {} / []yi" / () / {} / [] delete inside " " / () / {} / []di" / () / {} / [] edit inside " " / () / {} / []ci" / () / {} / [] Whole line operations- ActionsCommand dddelete ...Discuss·11 likesvim
Pratik MforOmniGuruomniguru.net·Nov 3, 20235 Essential Linux Tools for Effective Directory BurstingDirectory bursting (also known as directory brute forcing) is an important step in web application security testing. It involves discovering hidden files and directories on a web server by guessing common directories and file names. Attackers often u...Discuss·239 readsLinuxLinux
prakashhackreveal.hashnode.dev·Aug 1, 2023BeEF: An Essential Kali Linux Tool for Penetration TestingBeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser. Amid growing concerns about web-borne attacks against clients, including mobile clients. BeEF allows the professional penetration ...Discusslinux tools
Matthew Hardmatthewhard.com·Apr 26, 202310 Important Pentesting Tools for Your Tool BagAs a pentester, having the right tools is key to getting the job done right. Whether you're testing the security of a web application or a wireless network, these 10 tools are a must-have in your tool bag. Nmap: This tool is like a Swiss Army knife ...Discuss·59 readspentesting