Encrypted internet traffic is on an explosive upturn. According to the Google® Transparency Report: “Users load more than half of the pages they view over HTTPS and spend two-thirds of …
Tag:
Recommended
-
AMDHackingLinuxMetasploitMonitoringNetwork TrafficPasswordSecurityShell ScriptUS-CertWindowsWireshark
Publicly Available Tools Seen in Cyber Incidents Worldwide
by blackMOREby blackMORERemote Access Trojan: JBiFrost First observed in May 2015, the JBiFrost RAT is a variant of the Adwind RAT, with roots stretching back to the Frutas RAT from 2012. A …
-
DatabaseHow toKali LinuxLinuxPasswordPythonScanningSecurity
Configure, Tune, Run and Automate OpenVAS on Kali Linux
by blackMOREby blackMOREUsers often request the addition of vulnerability scanners to Kali, most notably the ones that begin with “N”, but due to licensing constraints, we do not include them in the …
-
Kali LinuxNetHunterSecurityWireless LAN (Wi-Fi)
Introducing Kali Linux NetHunter and NetHunter supported devices
by blackMOREby blackMOREFeatured: The Kali Linux NetHunter project is the first Open Source Android penetration testing platform for Nexus devices, created as a joint effort between the Kali community member “BinkyBear” and …
-
FeaturedLinuxOthers
Recommended books for Pentesters – A collection of books for Linux security administrators and pentesters
by blackMOREby blackMORESo you want to be pentester? A common question is where do you start? This post gives you a list of recommended books for Pentesters. It is useful for any …