Modern Penetration testing and Red Teaming often requires to bypass common AV/EDR appliances in order to execute code on a target. With time, defenses are becoming more complex and inherently …
Category:
Usability
-
BrowserCommand Line Interface (CLI)LinuxMonitoringOthersPasswordUsabilityUSBWindows
PuTTY alternatives
by blackMOREby blackMOREPuTTY is the most popular SSH client for Windows based systems. In fact it’s so popular that people actually install it in Linux (apt-get install putty)I. PuTTY is easy to …
-
HackingHow toNewsSecurityUsability
Android Banking Trojan Virus code leaks and sparks copycats immediately
by blackMOREby blackMOREIn the dark tech world, it is uncommon for virus coders to develop Android banking Trojans and distribute their source code for free to the public. However, according to Dr. …
-
BINDCheat SheetCommand Line Interface (CLI)DatabaseHow toLinux AdministrationPasswordSecuritySoundUsabilityWireshark
Top 30 SSH shenanigans
by blackMOREby blackMORESecure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. The best known example application is for remote login to computer systems by …
-
AMDDriverHow toKali LinuxLinuxSoundUsability
Building updated Kali Linux ISO
by blackMOREby blackMOREAre you tired of downloading Kali Packages every-time you re-install? Kali Linux 2016.1? I know I am. The 2.6G ISO file was released back in January 2016 and since then …
Newer Posts