Wednesday, 9 July 2025
  • Privacy Policy
  • Contact Us
  • My account
    • Checkout
    • Cart
James Eduard
  • Home
  • How To’s
  • Microsoft
    • Microsoft 365
    • Microsoft Defender
    • Microsoft Intune
    • Microsoft Entra
    • Microsoft Sentinel
    • Azure AD
  • Linux
    • CentOS
    • Debian
    • ElementaryOS
    • Fedora
    • Kali Linux
    • FreeBSD
    • Linuxmint
    • Redhat
    • RHEL
    • Open Suse
    • Ubuntu
  • MacOS
  • Cloud
    • VMWare
    • Azure
    • AWS
    • Cloudflare
    • DevOps
      • Dynatrace
      • Terraform
      • Docker
  • Security
    • Capture the Flag
      • HackTheBox
    • Hardware Hacking
    • Forensics Tools
    • Hacker Conference
    • InfoSec
    • Exploit

Breaking News

  • BruteX – Automatically Brute Force all services running on a Target 10 years ago
  • XSSYA – Cross Site Scripting Scanner & Vulnerability Confirmation 10 years ago
  • REMnux – A Linux Toolkit for Reverse-Engineering and Analyzing Malware 10 years ago
  • SPF – SpeedPhish Framework 10 years ago
  • RootCON9 Call for Papers 10 years ago
  • How to Patch VENOM Vulnerability [CVE-2015-3456] on Linux 10 years ago
James Eduard

James Eduard

ZIB-Trojan – The Open Tor Botnet

October 30, 2015 0 Comment

General information and instructions. The Open Tor Botnet requires the installation and configuration of bitcoind, however I neglect to detail…

Powercat – The Powershell Version [Netcat]

October 27, 2015 0 Comment

Powercat is a powershell function. First you need to load the function before you can execute it. You can put…

Zero Days – Security Leaks for Sale ( Documentary by VPRO Backlight)

October 24, 2015 0 Comment

Zero Days – Security Leaks for Sale ( Documentary by VPRO Backlight) Zero days is a 49-minute documentary about hacking…

Wifi Arsenal – A pack of various usefull/useless tools for 802.11 hacking

October 23, 2015 0 Comment

WiFi arsenal is a pack of various usefull/useless tools for 802.11 hacking Short description: P0cL4bs/3vilTwinAttacker -Framework for Rogue Wi-Fi Access…

xcat – Automate XPath injection attacks to retrieve documents

October 23, 2015 0 Comment

XCat is a command line program that aides in the exploitation of blind XPath injection vulnerabilities. It can be used…

WordPress XML RPC Brute Force Exploit by 1N3

October 19, 2015 0 Comment

WordPress XML-RPC Brute Force Amplification PoC by 1N3, this is a small PoC exploit to launch a brute force amplification…

B374K – PHP Webshell with handy features

October 19, 2015 0 Comment

This PHP Shell is a useful tool for system or web administrator to do remote management without using cpanel, connecting…

How to Upgrade from Ubuntu 15.04 to Ubuntu 15.10 in Ubuntu Desktop and Server

October 17, 2015 0 Comment

In this article we will guide you how to upgrade your existing Ubuntu 15.04 to Ubuntu 15.10. The final release…

World Without Linux Episode 2: Are We There Yet? – Linux Foundation

October 17, 2015 0 Comment

In episode number 2 of this six-part series, we learn what a world without Linux could mean to direction. That…

World Without Linux Episode 1 – Linux Foundation

October 17, 2015 0 Comment

    Linux is the world’s largest collaborative project in the history of computing. It runs most of the world’s…

Posts pagination

Previous 1 … 16 17 18 … 34 Next
  • LinkedIn
  • Twitter
  • Facebook
  • RSS Feed

HackTheBox Badge

HTB Badge
Klook.com Klook.com

Recent Posts

  • Introducing Quick Machine Recovery: Microsoft’s Solution to Driver-Induced Blue Screens
  • DevToys: The Ultimate Swiss Army Knife for Developers and Security Analysts
  • How to Renew the Apple MDM Push Certificate
  • How to Create a New Apple ID for MDM – A Step-by-Step Guide
  • How to Install PowerShell on Windows, Linux, and macOS

Categories

  • Azure
  • DevOps
  • Docker
  • How To’s
  • Linux
  • Malware
  • Network Security
  • Powershell
  • Security







Klook.com
Follow on LinkedIn

© Copyright 2011 James Eduard