Skip to content

Information, Cybersecurity & Technology

Just another IT & Cybersecurity Page

Menu
  • How to …
    • Linux
      • How to: Debian indestructable with btrfs
      • How to: install office2k3 on Linux
      • How to: SSH Passwordless Login
      • How to: Install Webmin on Debian based Systems
      • How to: Easy Get Free SSL/TLS Certificate
      • How to: configure Bind9
    • KALI-Linux
      • How to Kali
        • Kali steps i do after Installation
      • How to: Fix Kali 2022.1 Wifi problems.
        • Blog
  • Contact
  • About
  • Home

Monat: März 2022

Raccoon stealer

Keine Kommentare
| KALI-Linux

Raccoon Stealer Abuses Telegram Infrastructure to Store C&C Addresses Read more: https://cybersecuritynews.com/raccoon-stealer-abuses…/

Read More »

Kali Unkaputtbar – A new Boot Menu to Boot Directly into Snapshots

Keine Kommentare
| cybersecurity, KALI-Linux, Linux

A new feature has been introduced recently for Kali Linux by Offensive Security, dubbed as Kali Unkaputtbar. This newly added feature offers the users of Kali Linux a new menu to boot directly into snapshots. This new feature is available on all Kali Linux 2022.1 and on the later systems that by default utilize the […]

Read More »

The Two Sides of the OSINT Coin: A Tool for Hackers and Against Hackers by Gergo Varga

Keine Kommentare
| cybersecurity

The cybersecurity and fraud world plays host to a relentless series of “cat and mouse” games between criminals and those who work to thwart their efforts.  Open source intelligence (OSINT) is a great example of how technology can be used both by nefarious hackers and by those who seek to turn the tables on them. […]

Read More »

Pwndora – create your own IoT search engine at home

Keine Kommentare
| cybersecurity

Pwndora is a massive and fast IPv4 address range scanner, integrated with multi-threading.Using sockets, it analyzes which ports are open, and collects more information about targets, each result is stored in Elasticsearch. You can integrate with Kibana to be able to visualize and manipulate data, basically it’s like having your own IoT search engine at […]

Read More »

Otseca Opensource security auditing tool

Keine Kommentare
| cybersecurity, pentesting

The main assumption of creating this tool was easier and faster delivery of commands sets to be performed on customer environments. As a result of such a scan I wanted to get the most useful information about system components that will be subjected to penetration tests and audits at a later time. Donwload: Here

Read More »

Anonymous Message To Russian Citizens

Keine Kommentare
| anonymous

Read More »

Hackers fork open-source reverse tunneling tool for persistence

Keine Kommentare
| News, ransomware attack

Security experts have spotted an interesting case of a suspected ransomware attack that employed custom-made tools typically used by APT (advanced persistent threat) groups. Although no concrete connection between groups has been uncovered, the operational tactics, targeting scope, and malware customization capabilities signify a potential connection. As detailed in a report sent to Bleeping Computer […]

Read More »

Key is stored in legacy trusted.gpg keyring (/etc/apt/trusted.gpg), see the DEPRECATION section in apt-key(8) for details.

Keine Kommentare
| Linux

The new rules for apt-keys need some attentions: download an convert the .key file (Release.key) to .gpg create a new list file in /etc/apt/source.list.d/ After all reload source list

Read More »

Very advanced Fuzzrt

Keine Kommentare
| cybersecurity, KALI-Linux, pentesting

VAF :– very advanced (web) fuzzer. Features: Grepping Outputing results to a file Status code filtering Detect reflexivness (useful for finding xss) Add prefixes, suffixes Custom wordlists Fuzz any part of the url Fuzz POST data URL encode payload Disclaimer:- This project was created for educational purposes and should not be used in environments without […]

Read More »

Cloudflare to auto-brick servers that go offline in Ukraine, Russia

Keine Kommentare
| News

Cloudflare announced that it is taking drastic measures to protect data of customers in Eastern Europe under current conditions of the Russian invasion of Ukraine. The U.S.-based web infrastructure and security company known for its DDoS mitigation services announced its decision to stay in the Russian market, albeit with some aspects of its business suspended.“ […]

Read More »

Seitennummerierung der Beiträge

1 2 Nächste

Last

  • grub recover btrfs
  • FIX Missing firmware
  • NMAP Cheat Sheet v1
  • Recover from Snapshot
  • How To: fix Soundproblem on Kali 2022.3

Archive

  • Februar 2024
  • Juni 2023
  • Mai 2023
  • Oktober 2022
  • September 2022
  • Juni 2022
  • April 2022
  • März 2022
  • Februar 2022
  • November 2021

#android #bootloader #btrfs #bugbounty #cheetsheet #CVE #cybersecurity #cybersecurityawareness #CyberSecurityNews #cybersecuritytraining #Debian #emailharvester #encryptedUSBDrive #ethicalhacking #EthicalHackingOnlineTraining #grub #grubrescue #hackers #hacking #howto #informationsecurity #informationtechnology #infosec #infosec#infosecurity #infosecurity #install #kali #soundproblem #kalilinux #kernel #linux #LUKS #maleware #missingfirmware #nmap #pentesting #privacy #recovery #rescue #rusia #secureYourData #snapshot #waragainstukraine CVE ImHex Reverse Engineers

Information, Cybersecurity & Technology 2025 .