Library
Tutorials
A collection of programming guides we've put together over the years.
-
Mr.Bayes
How to Use Mr. Bayes for Model Selection
Learn how to use Mr. Bayes for model selection to improve your data analysis and get the most accurate results.
-
Mr.Bayes
How to Use Mr. Bayes for Phylogenetic Inference
Learn how to use Mr. Bayes to infer phylogenetic relationships and gain insights into evolutionary history.
-
Mr.Bayes
How to Run a Simple Mr. Bayes Analysis
Learn how to run a simple Mr. Bayes analysis with this step-by-step guide.
-
Mr.Bayes
How to Install Mr. Bayes
"Learn how to install Mr. Bayes and maximize its value with this easy-to-follow guide."
-
Kali Linux
How to Use XSSer for Cross-Site Scripting Attacks in Kali Linux
Learn how to use XSSer to exploit cross-site scripting vulnerabilities in Kali Linux with this comprehensive guide.
-
Kali Linux
How to Use the Social-Engineer Toolkit (SET) in Kali Linux
Learn how to use the powerful Social-Engineer Toolkit (SET) in Kali Linux to protect yourself from malicious attacks.
-
Kali Linux
How to Use BeEF for Browser Hacking in Kali Linux
Learn how to use BeEF to hack browsers in Kali Linux with this comprehensive guide.
-
Kali Linux
How to Use the SET Toolkit for Social Engineering Attacks in Kali Linux
Learn how to use the SET Toolkit to launch social engineering attacks in Kali Linux with this comprehensive guide.
-
Kali Linux
How to Use Maltego for Information Gathering in Kali Linux
Learn how to use Maltego to gather information in Kali Linux with this comprehensive guide.
-
Kali Linux
How to Use Burp Suite for Web Application Security Testing in Kali Linux
Learn how to use Burp Suite to securely test web applications in Kali Linux with this comprehensive guide.
-
Kali Linux
How to Use Metasploit for Exploitation and Payload Delivery in Kali Linux
Learn how to use Metasploit for exploitation and payload delivery in Kali Linux with this comprehensive guide.
-
Kali Linux
How to Use sqlmap for SQL Injection Attacks in Kali Linux
Learn how to use sqlmap to perform SQL injection attacks in Kali Linux with this comprehensive guide.
-
Kali Linux
How to Conduct Web Application Penetration Testing in Kali Linux
Learn how to conduct web application penetration testing in Kali Linux with this comprehensive guide.
-
Kali Linux
How to Use Aircrack-ng for WiFi Hacking in Kali Linux
Learn how to use Aircrack-ng to hack WiFi networks in Kali Linux with this comprehensive guide.
-
Kali Linux
How to Crack Passwords with John the Ripper in Kali Linux
Learn how to crack passwords with John the Ripper in Kali Linux with this step-by-step guide.
-
Kali Linux
How to Use Wireshark for Network Analysis in Kali Linux
Learn how to use Wireshark to analyze networks in Kali Linux with this comprehensive guide.
-
Kali Linux
How to Perform Network Scanning with Nmap in Kali Linux
Learn how to use Nmap to perform network scanning in Kali Linux with this comprehensive guide.
-
Kali Linux
How to Use the Reaver Tool for WPS PIN Cracking in Kali Linux
Learn how to use Reaver to crack WPS PINs in Kali Linux with this step-by-step guide.
-
Kali Linux
How to Use the WPForce Tool for WordPress Attack Automation in Kali Linux
Learn how to use WPForce to automate WordPress attacks in Kali Linux with this comprehensive guide.
-
Kali Linux
How to Use the Wifite Tool for WiFi Hacking in Kali Linux
Learn how to use the powerful Wifite tool to hack WiFi networks in Kali Linux with this comprehensive guide.
-
Kali Linux
How to Use the Pyrit Tool for WPA WPA2 Cracking in Kali Linux
Learn how to use the Pyrit tool to crack WPA/WPA2 passwords in Kali Linux with this comprehensive guide.
-
Kali Linux
How to Use the SSLyze Tool for SSL-TLS Scanning in Kali Linux
Learn how to use SSLyze to scan for SSL/TLS vulnerabilities in Kali Linux with this comprehensive guide.
-
Kali Linux
How to Use the MITMf Tool for Man-in-the-Middle Attacks in Kali Linux
Learn how to use the MITMf tool to perform man-in-the-middle attacks in Kali Linux with this comprehensive guide.
-
Kali Linux
How to Use the SSLstrip Tool for HTTPS Downgrading Attacks in Kali Linux
Learn how to use the SSLstrip tool to perform HTTPS downgrading attacks in Kali Linux.
-
Kali Linux
How to Use the NoSQLMap Tool for NoSQL Injection Attacks in Kali Linux
Learn how to use NoSQLMap to protect your system from NoSQL injection attacks in Kali Linux.
-
Kali Linux
How to Use the Metasploitable VM for Exploit Testing in Kali Linux
Learn how to use the Metasploitable VM to exploit test in Kali Linux with this comprehensive guide.
-
Kali Linux
How to Use OWASP ZAP for Web Application Security Testing in Kali Linux
Learn how to use OWASP ZAP for web application security testing in Kali Linux with this comprehensive guide.
-
Kali Linux
How to Use the Exploit Database in Kali Linux
Learn how to use the Exploit Database in Kali Linux to find and use security vulnerabilities for ethical hacking.
-
Kali Linux
How to Use the Armitage GUI for Metasploit in Kali Linux
Learn how to use the Armitage GUI for Metasploit in Kali Linux with this easy-to-follow guide.
-
Kali Linux
How to Use Vega for Web Vulnerability Scanning in Kali Linux
Learn how to use Vega for web vulnerability scanning in Kali Linux with this comprehensive guide.