Tuesday, 8 July 2025
  • Privacy Policy
  • Contact Us
  • My account
    • Checkout
    • Cart
James Eduard
  • Home
  • How To’s
  • Microsoft
    • Microsoft 365
    • Microsoft Defender
    • Microsoft Intune
    • Microsoft Entra
    • Microsoft Sentinel
    • Azure AD
  • Linux
    • CentOS
    • Debian
    • ElementaryOS
    • Fedora
    • Kali Linux
    • FreeBSD
    • Linuxmint
    • Redhat
    • RHEL
    • Open Suse
    • Ubuntu
  • MacOS
  • Cloud
    • VMWare
    • Azure
    • AWS
    • Cloudflare
    • DevOps
      • Dynatrace
      • Terraform
      • Docker
  • Security
    • Capture the Flag
      • HackTheBox
    • Hardware Hacking
    • Forensics Tools
    • Hacker Conference
    • InfoSec
    • Exploit

Breaking News

  • RootCON 9 – Hacker Conference [Activities] 10 years ago
  • How to Patch VENOM Vulnerability [CVE-2015-3456] on Linux 10 years ago
  • RootCON9 Call for Papers 10 years ago
  • Facebook CTF is Now Open Source! 9 years ago
  • XSSYA – Cross Site Scripting Scanner & Vulnerability Confirmation 10 years ago
  • REMnux – A Linux Toolkit for Reverse-Engineering and Analyzing Malware 10 years ago
James Eduard

James Eduard

CLOUDKiLL3R – Bypasses Cloudflare Protection Service Via TOR Browser

March 23, 2018 0 Comment

CLOUDKiLL3R Requirements : TOR Browser to scan as many sites as you want 🙂 Python Compiler CLOUDKiLL3R Installation ? Make…

DefenseMatrix – Full security solution for Linux Servers

March 19, 2018 0 Comment

DefenseMatrix helps individuals and organizations who use Linux to secure their servers on various dimentions automatically. It makes securing a…

PiKarma – Detects Wireless Network Attacks

January 12, 2018 0 Comment

PiKarma – Detects wireless network attacks performed by KARMA module (fake AP) and starts de-authentication attack for fake access points…

Sn1per – Automated Pentest Recon Scanner

January 5, 2018 0 Comment

Sn1per – is an automated scanner that can be used during a penetration test to enumerate and scan for vulnerabilities,…

FSociety Hacking Tools Pack – A Penetration Testing Framework

January 2, 2018 0 Comment

fsociety Hacking Tools Pack – A Penetration Testing Framework A Penetration Testing Framework , you will have evry script that…

CVE-2017-17411: Linksys WVBR0 25 Command Injection

December 26, 2017 0 Comment

Recently a security researcher Ricky Lawshae from Trend Micro discover a critical vulnerability on Linksys Wireless Bridge WVBR0-25 this allows…

Virtualbox 5.2.4 Fixed Gnome Login & Improved High Resolution Display

December 21, 2017 0 Comment

Oracle Virtualbox reached 5.2.4, the second maintenance release for the 5.2 series with various high resolution display improvements, Gnome shell…

AhMyth Android RAT – Android Remote Administration Tool

July 16, 2017 0 Comment

AhMyth Android RAT is an Android Remote Administration Tool Beta Version It consists of two parts: Server side: desktop application…

Evilginx – MITM Attack Framework anAdvanced Phishing with Two-factor Authentication Bypass

April 18, 2017 0 Comment

Evilginx is a man-in-the-middle attack framework used for phishing credentials and session cookies of any web service. It’s core runs…

HITMAN is now on Linux – Available at Steam

February 18, 2017 0 Comment

About this Game   Become the master assassin in an intense spy-thriller story across a world of assassination. Travel the…

Posts pagination

Previous 1 … 10 11 12 … 34 Next
  • LinkedIn
  • Twitter
  • Facebook
  • RSS Feed

HackTheBox Badge

HTB Badge
Klook.com Klook.com

Recent Posts

  • Introducing Quick Machine Recovery: Microsoft’s Solution to Driver-Induced Blue Screens
  • DevToys: The Ultimate Swiss Army Knife for Developers and Security Analysts
  • How to Renew the Apple MDM Push Certificate
  • How to Create a New Apple ID for MDM – A Step-by-Step Guide
  • How to Install PowerShell on Windows, Linux, and macOS

Categories

  • Azure
  • DevOps
  • Docker
  • How To’s
  • Linux
  • Malware
  • Network Security
  • Powershell
  • Security







Klook.com
Follow on LinkedIn

© Copyright 2011 James Eduard