Category: Termux

How to install kali linux on android without root

How To Install Kali Linux On Android Without Root

How to install kali linux on android In this article, we are going to learn about how we can install kali linx on non-rooted android devices/smartphone easily and turn them into hacking machines. Let’s Get Started…   Kali Linux Installation Steps for Non-rooted Android Devices 1. Basic requirements On our Android device, we must first instal Termux and Hacker’s Keyboard. These apps are available through the Google Playstore. 2. Setting Up Environment for Kali Linux Installation The next step is to gather the packages we’ll need for the installation. First, update and upgrade the system with :

Read More
footprinting in ethical hacking

Footprinting in Ethical Hacking 2025

In this article, We will know about Footprinting in Ethical Hacking 2025. We have hear about Footprinting, but we don’t know about. Let me introduce about Footprinting.   What is Footprinting in Ethical Hacking? Footprinting is an ethical hacking method that involves gathering as much information as possible about a certain targeted computer system, infrastructure, or network in order to uncover possibilities to enter it. It is one of the most efficient methods of identifying vulnerabilities.   Purpose of Footprinting Footprinting evaluates an organization’s security and identifies potential vulnerabilities.   Information gathered Footprinting may involve gathering information

Read More
Command to install osint tool

Command to install Osintgram – OSINT TOOL

In this article, We will learn how to install Osintgram – OSINT TOOL . Introduction about Osintgram Osintgram is a OSINT tool on Instagram. That offers an interactive shell to perform analysis on Instagram account of any users by its nickname on instagram. Open Source Intelligence (OSINT) is the process of acquiring information from public or other open sources for use by security specialists, national intelligence agencies, or cybercriminals. When employed by cyber defenders, the purpose is to identify publicly available information about their company that attackers may exploit, and then take actions to avoid further assaults.

Read More

Dip Ranjan Sharma

Hacking Enthusiastic

Feel free to Contact me at dip@lofixhacking.com

Course

Learn Hacking with Lofi X Hacking

Free