Remote Access Trojan: JBiFrost First observed in May 2015, the JBiFrost RAT is a variant of the Adwind RAT, with roots stretching back to the Frutas RAT from 2012. A …
Hacking
The word “hacking” has two definitions. The first definition refers to the hobby/profession of working with computers. The second definition refers to breaking into computer systems. While the first definition is older and is still used by many computer enthusiasts (who refer to cyber-criminals as “crackers”), the second definition is much more commonly used.
-
BrowserDatabaseHackingMonitoringOthersPasswordScanningSecuritySecurity SoftwareSpam
Catching bad guys
by blackMOREby blackMOREEver wondered how the good guys catch bad guys? I meant to say, what’s the process of catching bad guys who create virus, malware, crypto-lockers? It’s sort of a grey …
-
Data RecoveryHackingHow toKali LinuxLinuxSecurityVideo
Steganography in Kali Linux – Hiding data in image
by blackMOREby blackMORESteganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. Generally, the hidden messages appear to be (or be part of) …
-
Bugs (Software and Hardware)CrackingDatabaseHackingHacking ToolsPasswordSecuritySecurity SoftwareWindowsWordPress
Anti-hacking tool got hacked, KeeFarce can break your KeePass password safe
by blackMOREby blackMOREIf you are a KeePass user like me, then beware. denandz just posted a tool in github that can break your KeePass password safe. Yeah, as they say, for the …
-
HackingHow toKali LinuxLinuxMetasploitSecurityWindowsWordPress
How to search exploits in metasploit?
by blackMOREby blackMOREMetasploit was created by H. D. Moore in 2003 as a portable network tool using Perl. By 2007, the Metasploit Framework had been completely rewritten in Ruby. On October 21, …