Group Details Private


  • A very happy Eid Mubarak to everyone around the world!

    On this holy festive, wishing you a day filled with lots of laughter and happy moments. Eid Mubarak to you and your family from everyone at Flaw Tech!

    posted in General Discussion
  • Installing Win-Kex (Kali Linux on Windows 10) with WSL

    I have been wanting to do a little tutorial on something for a while now and I thought a tutorial on how to setup Win-Kex (aka Kali Linux on Windows 10 with a graphical user interface) could be one that some members might find interesting.

    You'll find using Win-Kex useful if, for a simple example, you'd like to natively run Kali Linux on top of Windows 10 without having to use Virtualbox.

    I enjoyed using WSL in general when I was doing programming with Python and not wanting to deal with Windows 10 (python is a pain to program with on Windows 10 compared to programming with it on Linux).

    If you're still a bit confused as to what Win-Kex is, this short screen recording I took might help:

    Kali WSL

    Links to and Microsoft guide on Win-Kex and installing Windows Subsystem for Linux, in case anyone needs more information that I haven't included in my tutorial:

    Let's start

    The first thing you'll need is to install WSL 2.

    One way you can install WSL, is by using the Simplified Installation for Windows Insiders. If you've joined the Windows Insider Program, all you have to do is enter the command:

    wsl --install

    Yep, it's apparently that easy if you are in the Windows Insider Program.

    If you haven't joined the Windows Insider Program, like I haven't, then no problem, just a few more steps you'll have to take.

    1. Open Windows Powershell as an administrator and run this command:

      Enable-WindowsOptionalFeature -Online -FeatureName Microsoft-Windows-Subsystem-Linux
    2. Restart

    3. Open Powershell as administrator and run these commands:

      dism.exe /online /enable-feature /featurename:VirtualMachinePlatform /all /norestart
      dism.exe /online /enable-feature /featurename:Microsoft-Windows-Subsystem-Linux /all /norestart
    4. Restart

    5. Download and install the WSL 2 Linux Kernel:

    6. Open Powershell as administrator (yet again) and enter the command:

      wsl --set-default-version 2
    7. Install Kali Linux from the Microsoft Store (or from this link: Get Kali Linux)

      --To upgrade an existing WSL 1 Kali Linux installation, run:

      wsl --set-version kali-linux 2
    8. Run Kali and finish the initial setup

    Now, you need to install Win-Kex (open up Kali Linux in Windows Terminal to do this, don't enter the following commands in Powershell):

    After installing Win-Kex, you can use the kex command to start up Win-Kex, end Win-Kex sessions, and numerous other things.

    If you're wondering what those other things are, just type kex --help and you'll get a list of all the different commands and the syntax usage.

    Anyway, that should be pretty much all you need to know to get Win-Kex installed and start checking it out.

    Hope you found this guide helpful!

    posted in Security
  • Compilation of Penetration Testing Tools

    Here is a compilation of multiple forensic and penetration testing tools for applications, networks, and websites.


    Nmap is a very versatile tool developed to scan addresses (IPV6 included), this tool allows the users to gather a mass amount of information about the target quickly, information including open ports, + much, much more.

    Nmap supports a large number of scanning techniques such as UDP, TCP connect(), TCP SYN (half-open), FTP proxy (bounce attack), ICMP (ping sweep), FIN, ACK sweep, Xmas Tree, SYN sweep, IP Protocol, and Null scan.


    Official Website


    A very powerful network troubleshooting and analysis tool, Wire shark provides the ability to view data from a live network and supports hundreds of protocols and media formats.


    Official Website

    Cain & Abel

    Cain and Abel is a revolutionary tool that provides many functions that are able to do various password retrieval jobs, cracking passwords, sniffing networks, and routing/analyzing protocols. This tool is Windows-only, unlike many other tools that exist, this is a pleasant twist to modern penetration testing and forensic tools.


    Official Website


    Metasploit, a very powerful network security and analysis tool, used often for penetration attacks, this tool has a clean interface and easily gathers the information that you seek.


    Official Website


    Ettercap is a suite for man-in-the-middle attacks on LAN. It features sniffing of live connections, content filtering on the fly, and many other interesting tricks. It supports active and passive dissection of many protocols (even ciphered ones) and includes many features for network and host analysis. (Taken from their website).


    Official Website


    The Nessus tool provides high-speed data discovery, asset profiling, configuration auditing, and vulnerability analysis of networks.


    Official Website


    W3af is an extremely popular, powerful, and flexible framework for finding and exploiting web application vulnerabilities. It is easy to use and extend and features dozens of web assessment and exploitation plugins. In some ways, it is like a web-focused Metasploit.


    Official Website

    Burp Suite

    Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application's attack surface to finding and exploiting security vulnerabilities.


    Official Website

    posted in Security
  • Moving Placeholder to Top on Focus (Input Element)

    If you want the placeholder to move to the top when the textbox is on focus and also while the user is typing, here's the code for it:


      <input type="text" class="inputText" required/>
      <span class="floating-label">Email Address</span>


    input:focus ~ .floating-label,
    input:not(:focus):valid ~ .floating-label{
      top: 5px;
      bottom: 10px;
      left: 15px;
      font-size: 11px;
      height: 11px;
      opacity: 1;
      padding: 0 5px;
    .inputText {
      font-size: 14px;
      width: 200px;
      height: 45px;
      padding: 0 10px;
      color: #202124;
      border: 1px solid gray;
      border-radius: 8px;
    .floating-label {
      position: absolute;
      pointer-events: none;
      left: 20px;
      top: 22px;
      transition: 0.2s ease all;
      font-family: Roboto,'Noto Sans Myanmar UI',arial,sans-serif;
    posted in HTML
  • No Selling of Cracks or Warez

    Members are warned that selling of any crack, illegally copied software, warez, etc, is NOT ALLOWED and any members suspected of this will be BANNED. Both seller AND customer will be banned.

    Please keep your questions, answers, and knowledge out of PM and in the forum where it belongs, and where everybody benefits by learning rather than one person benefiting financially.

    posted in Marketplace
  • Over 25% Of Tor Exit Relays Spies On Users

    An unknown threat actor managed to control over 27% of the entire Tor network exit capacity in early February 2021, a new study on the dark web infrastructure revealed.

    For more information read this article:

    posted in Security
  • Announcing VIP Subscription

    We are pleased to announce an exclusive VIP subscription for the most discerning members of our fine community.

    Starting today anyone can subscribe to our VIP subscription by donating any amount. You can choose to donate $5 or $500, it doesn't matter!

    List of VIP members of our forum can be found here:

    For more information please read our blog post:

    posted in Announcements
  • RE: Cryptocurrency Frequently Asked Questions

    @victor-oparaugo Please mention the group you are referring to. If you are not clear about what you are saying and asking people to contact you to get information, personally I would consider you a scammer as well.

    posted in Cryptocurrency