Step by step guide on configuring Raspberry Pi4 to boot Ubuntu from external USB SSD drive
Memory
-
How toPythonSecurity SoftwareUsabilityWindows
Inceptor – Template-Driven AV/EDR Evasion Framework
by blackMOREby blackMOREModern Penetration testing and Red Teaming often requires to bypass common AV/EDR appliances in order to execute code on a target. With time, defenses are becoming more complex and inherently …
-
DatabaseDockerHackingPythonPython3Security
Vulnerable docker environment for learning to hack
by blackMOREby blackMOREVulhub is an open-source collection of pre-built vulnerable docker environment for learning to hack. No pre-existing knowledge of docker is required, just execute two simple commands and you have a …
-
BrowserHackingHow toLinuxNetwork TrafficTechnical DocumentationWireshark
Change IP address in packet capture file (faking IP)
by blackMOREby blackMOREI’m sure you bumped into situations where you needed to fake IP address in a capture file. This maybe required when you’re trying to send the capture file to someone …
-
Bugs (Software and Hardware)SecurityUS-Cert
Side-Channel Vulnerability Variants 3a and 4 – Spectre and Meltdown
by blackMOREby blackMOREOn May 21, 2018, new variants of the side-channel central processing unit (CPU) hardware vulnerabilities known as Spectre and Meltdown were publicly disclosed. These variants—known as 3A and 4—can allow …