The notorious cybercrime group previously known as Hellokity has reemerged under a new alias, “HelloGookie.” This development...
Blog
Your blog category
A bash script to automate the most basic usage of LUKS volumes in Linux. Like:Creating a virtual...
Last Friday, on my way home from 31c3, a funny thing happened on my way through Charles...
Router Post-Exploitation Framework Currently, the framework includes a number of firmware image modules:‘Verified’ – This module is...
CeWL is a ruby app which spiders a given url to a specified depth, optionally following external...
With the end of 2014 dashing to a close and 2015 just over the hill, let’s take...
John the Ripper is a free password cracking software tool. Initially developed for the Unix operating system,...
Would you like to know the process behind web scanning? What is Nikto Web Vulnerability Scanner? This...
By Deeba Ahmed Veriti Research exposes surge in Androxgh0st attacks, exploiting CVEs and building botnets for credential...
Cybersecurity researchers have disclosed what they say is the “first native Spectre v2 exploit” against the Linux...