Skip to content

Information, Cybersecurity & Technology

Just another IT & Cybersecurity Page

Menu
  • How to …
    • Linux
      • How to: Debian indestructable with btrfs
      • How to: install office2k3 on Linux
      • How to: SSH Passwordless Login
      • How to: Install Webmin on Debian based Systems
      • How to: Easy Get Free SSL/TLS Certificate
      • How to: configure Bind9
    • KALI-Linux
      • How to Kali
        • Kali steps i do after Installation
      • How to: Fix Kali 2022.1 Wifi problems.
        • Blog
  • Contact
  • About
  • Home

Schlagwort: #informationsecurity

The Two Sides of the OSINT Coin: A Tool for Hackers and Against Hackers by Gergo Varga

Keine Kommentare
| cybersecurity

The cybersecurity and fraud world plays host to a relentless series of “cat and mouse” games between criminals and those who work to thwart their efforts.  Open source intelligence (OSINT) is a great example of how technology can be used both by nefarious hackers and by those who seek to turn the tables on them. […]

Read More »

Pwndora – create your own IoT search engine at home

Keine Kommentare
| cybersecurity

Pwndora is a massive and fast IPv4 address range scanner, integrated with multi-threading.Using sockets, it analyzes which ports are open, and collects more information about targets, each result is stored in Elasticsearch. You can integrate with Kibana to be able to visualize and manipulate data, basically it’s like having your own IoT search engine at […]

Read More »

Otseca Opensource security auditing tool

Keine Kommentare
| cybersecurity, pentesting

The main assumption of creating this tool was easier and faster delivery of commands sets to be performed on customer environments. As a result of such a scan I wanted to get the most useful information about system components that will be subjected to penetration tests and audits at a later time. Donwload: Here

Read More »

Very advanced Fuzzrt

Keine Kommentare
| cybersecurity, KALI-Linux, pentesting

VAF :– very advanced (web) fuzzer. Features: Grepping Outputing results to a file Status code filtering Detect reflexivness (useful for finding xss) Add prefixes, suffixes Custom wordlists Fuzz any part of the url Fuzz POST data URL encode payload Disclaimer:- This project was created for educational purposes and should not be used in environments without […]

Read More »

Nightingale Docker Enviroment

Keine Kommentare
| cybersecurity, KALI-Linux, pentesting

Nightingale:– It’s a Docker Environment of the KALI-Linux having all the required tools for #VAPT.Nightingale contains all the required well-known tools that will be required to the Pentesters at the time of Penetration Testing. This docker image has the base support of Debian and it is completely platform Independent. Disclaimer:- This project was created for […]

Read More »

Seitennummerierung der Beiträge

Vorherige 1 2

Last

  • grub recover btrfs
  • FIX Missing firmware
  • NMAP Cheat Sheet v1
  • Recover from Snapshot
  • How To: fix Soundproblem on Kali 2022.3

Archive

  • Februar 2024
  • Juni 2023
  • Mai 2023
  • Oktober 2022
  • September 2022
  • Juni 2022
  • April 2022
  • März 2022
  • Februar 2022
  • November 2021

#android #bootloader #btrfs #bugbounty #cheetsheet #CVE #cybersecurity #cybersecurityawareness #CyberSecurityNews #cybersecuritytraining #Debian #emailharvester #encryptedUSBDrive #ethicalhacking #EthicalHackingOnlineTraining #grub #grubrescue #hackers #hacking #howto #informationsecurity #informationtechnology #infosec #infosec#infosecurity #infosecurity #install #kali #soundproblem #kalilinux #kernel #linux #LUKS #maleware #missingfirmware #nmap #pentesting #privacy #recovery #rescue #rusia #secureYourData #snapshot #waragainstukraine CVE ImHex Reverse Engineers

Information, Cybersecurity & Technology 2025 .