Skip to content

Information, Cybersecurity & Technology

Just another IT & Cybersecurity Page

Menu
  • How to …
    • Linux
      • How to: Debian indestructable with btrfs
      • How to: install office2k3 on Linux
      • How to: SSH Passwordless Login
      • How to: Install Webmin on Debian based Systems
      • How to: Easy Get Free SSL/TLS Certificate
      • How to: configure Bind9
    • KALI-Linux
      • How to Kali
        • Kali steps i do after Installation
      • How to: Fix Kali 2022.1 Wifi problems.
        • Blog
  • Contact
  • About
  • Home

Otseca Opensource security auditing tool

Keine Kommentare
| cybersecurity, pentesting

The main assumption of creating this tool was easier and faster delivery of commands sets to be performed on customer environments. As a result of such a scan I wanted to get the most useful information about system components that will be subjected to penetration tests and audits at a later time. Donwload: Here

Read More »

Anonymous Message To Russian Citizens

Keine Kommentare
| anonymous

Read More »

Hackers fork open-source reverse tunneling tool for persistence

Keine Kommentare
| News, ransomware attack

Security experts have spotted an interesting case of a suspected ransomware attack that employed custom-made tools typically used by APT (advanced persistent threat) groups. Although no concrete connection between groups has been uncovered, the operational tactics, targeting scope, and malware customization capabilities signify a potential connection. As detailed in a report sent to Bleeping Computer […]

Read More »

Key is stored in legacy trusted.gpg keyring (/etc/apt/trusted.gpg), see the DEPRECATION section in apt-key(8) for details.

Keine Kommentare
| Linux

The new rules for apt-keys need some attentions: download an convert the .key file (Release.key) to .gpg create a new list file in /etc/apt/source.list.d/ After all reload source list

Read More »

Very advanced Fuzzrt

Keine Kommentare
| cybersecurity, KALI-Linux, pentesting

VAF :– very advanced (web) fuzzer. Features: Grepping Outputing results to a file Status code filtering Detect reflexivness (useful for finding xss) Add prefixes, suffixes Custom wordlists Fuzz any part of the url Fuzz POST data URL encode payload Disclaimer:- This project was created for educational purposes and should not be used in environments without […]

Read More »

Cloudflare to auto-brick servers that go offline in Ukraine, Russia

Keine Kommentare
| News

Cloudflare announced that it is taking drastic measures to protect data of customers in Eastern Europe under current conditions of the Russian invasion of Ukraine. The U.S.-based web infrastructure and security company known for its DDoS mitigation services announced its decision to stay in the Russian market, albeit with some aspects of its business suspended.“ […]

Read More »

The Dirty Pipe Vulnerability CVE2022-0847

Keine Kommentare
| CVE, cybersecurity, Uncategorized

This is the story of CVE-2022-0847, a vulnerability in the Linux kernel since 5.8 which allows overwriting data in arbitrary read-only files. This leads to privilege escalation because unprivileged processes can inject code into root processes. It is similar to CVE-2016-5195 “Dirty Cow” but is easier to exploit. The vulnerability was fixed in Linux 5.16.11, […]

Read More »

Nightingale Docker Enviroment

Keine Kommentare
| cybersecurity, KALI-Linux, pentesting

Nightingale:– It’s a Docker Environment of the KALI-Linux having all the required tools for #VAPT.Nightingale contains all the required well-known tools that will be required to the Pentesters at the time of Penetration Testing. This docker image has the base support of Debian and it is completely platform Independent. Disclaimer:- This project was created for […]

Read More »

ImHex – Hex Editor For Reverse Engineers

Keine Kommentare
| Development, Reverse Engineers

Awesome Tool, read HERE

Read More »

Karma V2 Passive Open Source Intelligence OSINT Automated Framework

Keine Kommentare
| Uncategorized

Karma Version 2 – A OSINT framework. Karma v2 can be used by Infosec Researchers, Penetration Testers, Bug Hunters to find deep information, OSINT and more assets, WAF/CDN bypassed IPs, Internal/External Infra, Publicly exposed leaks and many more about their target. Shodan Premium API key is required to use this automation. Output from the is […]

Read More »

Seitennummerierung der Beiträge

Vorherige 1 2 3

Last

  • grub recover btrfs
  • FIX Missing firmware
  • NMAP Cheat Sheet v1
  • Recover from Snapshot
  • How To: fix Soundproblem on Kali 2022.3

Archive

  • Februar 2024
  • Juni 2023
  • Mai 2023
  • Oktober 2022
  • September 2022
  • Juni 2022
  • April 2022
  • März 2022
  • Februar 2022
  • November 2021

#android #bootloader #btrfs #bugbounty #cheetsheet #CVE #cybersecurity #cybersecurityawareness #CyberSecurityNews #cybersecuritytraining #Debian #emailharvester #encryptedUSBDrive #ethicalhacking #EthicalHackingOnlineTraining #grub #grubrescue #hackers #hacking #howto #informationsecurity #informationtechnology #infosec #infosec#infosecurity #infosecurity #install #kali #soundproblem #kalilinux #kernel #linux #LUKS #maleware #missingfirmware #nmap #pentesting #privacy #recovery #rescue #rusia #secureYourData #snapshot #waragainstukraine CVE ImHex Reverse Engineers

Information, Cybersecurity & Technology 2025 .