Thursday, 10 July 2025
  • Privacy Policy
  • Contact Us
  • My account
    • Checkout
    • Cart
James Eduard
  • Home
  • How To’s
  • Microsoft
    • Microsoft 365
    • Microsoft Defender
    • Microsoft Intune
    • Microsoft Entra
    • Microsoft Sentinel
    • Azure AD
  • Linux
    • CentOS
    • Debian
    • ElementaryOS
    • Fedora
    • Kali Linux
    • FreeBSD
    • Linuxmint
    • Redhat
    • RHEL
    • Open Suse
    • Ubuntu
  • MacOS
  • Cloud
    • VMWare
    • Azure
    • AWS
    • Cloudflare
    • DevOps
      • Dynatrace
      • Terraform
      • Docker
  • Security
    • Capture the Flag
      • HackTheBox
    • Hardware Hacking
    • Forensics Tools
    • Hacker Conference
    • InfoSec
    • Exploit

Breaking News

  • SPF – SpeedPhish Framework 10 years ago
  • RootCON 9 – Hacker Conference [Activities] 10 years ago
  • How to Patch VENOM Vulnerability [CVE-2015-3456] on Linux 10 years ago
  • RootCON9 Call for Papers 10 years ago
  • REMnux – A Linux Toolkit for Reverse-Engineering and Analyzing Malware 10 years ago
  • Mr. Robot “Our Democracy has been Hacked” – Official Extended Trailer 10 years ago
James Eduard

James Eduard

BlackArch Linux Version 2015.07.31 Released

August 7, 2015 0 Comment

The new new BlackArch Linux ISOs has been released. The new BlackArch Linux Version 2015.07.31 include over 1230 tools for…

Passgen – Random character generator Crunch which attempts to solve cracking WPA/WPA2

July 24, 2015 0 Comment

Passgen is an alternative for the random character generator crunch which attempts to solve cracking WPA/WPA2 keys by randomizing the…

BetterCap – A complete, modular, portable and easily extensible MITM framework

July 22, 2015 0 Comment

BetterCap is an attempt to create a complete, modular, portable and easily extensible MITM framework with every kind of features…

Snitch – A tool which automate Information Gathering

July 18, 2015 0 Comment

Snitch is a tool which automate information gathering process for specified domain. Using build-in dork categories, this tool helps gather…

ProxyDroid – Set Proxys for Android devices (Http / Socks4 / Socks5)

July 16, 2015 0 Comment

ProxyDroid is an app that can help you to set the proxy (http / socks4 / socks5) on your android…

How to Install VirtualBox 5.0 Stable on RHEL/CentOS/Fedora and Debian/Ubuntu/Linux Mint

July 15, 2015 0 Comment

Virtualbox 5.0 was already released with lots of features and improvement on performance aand Virtualbox provides increased security with encryption.The 5.0…

Damn Vulnerable iOS Application (DVIA)

July 13, 2015 0 Comment

Damn Vulnerable iOS Application was born from the need to have a tool where a user can test their iOS…

Johnny – GUI for John the Ripper

July 11, 2015 0 Comment

Johnny is a cross-platform GUI frontend for John the Ripper, the popular password cracker, written in C++ using the Qt…

Q-shell – Quick Shell for Unix Administrator

July 10, 2015 0 Comment

Q-shell is quick shell for remote login into Unix system, it use blowfish crypt algorithm to protect transport data from…

Kali Linux 2.0 Release Day Scheduled

July 8, 2015 0 Comment

Kali 2.0 Teaser – Kali Sana! from Offensive Security on Vimeo.   Kali 2.0 Dojo at Black Hat & DEF…

Posts pagination

Previous 1 … 19 20 21 … 34 Next
  • LinkedIn
  • Twitter
  • Facebook
  • RSS Feed

HackTheBox Badge

HTB Badge
Klook.com Klook.com

Recent Posts

  • Introducing Quick Machine Recovery: Microsoft’s Solution to Driver-Induced Blue Screens
  • DevToys: The Ultimate Swiss Army Knife for Developers and Security Analysts
  • How to Renew the Apple MDM Push Certificate
  • How to Create a New Apple ID for MDM – A Step-by-Step Guide
  • How to Install PowerShell on Windows, Linux, and macOS

Categories

  • Azure
  • DevOps
  • Docker
  • How To’s
  • Linux
  • Malware
  • Network Security
  • Powershell
  • Security







Klook.com
Follow on LinkedIn

© Copyright 2011 James Eduard