In the dark tech world, it is uncommon for virus coders to develop Android banking Trojans and distribute their source code for free to the public. However, according to Dr. …
Category:
Security
-
CrackingDatabaseHackingHow toKali LinuxLinuxMetasploitSecurityUSBVideo
Find Linux Exploits by Kernel version
by blackMOREby blackMORESometimes it’s really hard to find the correct exploit for the device that you are pentesting. I found two good references that may be helpful or least will give you …
-
Data RecoveryHackingHow toKali LinuxLinuxSecurityVideo
Steganography in Kali Linux – Hiding data in image
by blackMOREby blackMORESteganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. Generally, the hidden messages appear to be (or be part of) …
-
BIOSBrowserCheat SheetCrackingDatabaseHow toKali LinuxLinuxMetasploitMonitoringNetworkingPasswordPythonSecuritySecurity ToolsShell ScriptWindowsWireshark
Kali Linux Cheat Sheet for Penetration Testers
by blackMOREby blackMOREPenetration testing (also called pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit. Kali Linux Cheat Sheet …
-
BrowserHow toLinux AdministrationOthersSecuritySpam
How to add RBL on Zimbra Server?
by blackMOREby blackMOREA DNS-based Blackhole List (DNSBL) or Real-time Blackhole List (RBL) is an effort to stop email spamming. It is a “blacklist” of locations on the Internet reputed to send email …