Sunday, 18 May 2025
  • Privacy Policy
  • Contact Us
  • My account
    • Checkout
    • Cart
James Eduard
  • Home
  • How To’s
  • Microsoft
    • Microsoft 365
    • Microsoft Defender
    • Microsoft Intune
    • Microsoft Entra
    • Microsoft Sentinel
    • Azure AD
  • Linux
    • CentOS
    • Debian
    • ElementaryOS
    • Fedora
    • Kali Linux
    • FreeBSD
    • Linuxmint
    • Redhat
    • RHEL
    • Open Suse
    • Ubuntu
  • MacOS
  • Cloud
    • VMWare
    • Azure
    • AWS
    • Cloudflare
    • DevOps
      • Dynatrace
      • Terraform
      • Docker
  • Security
    • Capture the Flag
      • HackTheBox
    • Hardware Hacking
    • Forensics Tools
    • Hacker Conference
    • InfoSec
    • Exploit

Breaking News

  • BruteX – Automatically Brute Force all services running on a Target 10 years ago
  • RootCON9 Call for Papers 10 years ago
  • RootCON 9 – Hacker Conference [Activities] 10 years ago
  • How to Upgrade from Ubuntu 15.04 to Ubuntu 15.10 in Ubuntu Desktop and Server 10 years ago
  • XSSYA – Cross Site Scripting Scanner & Vulnerability Confirmation 10 years ago
  • SPF – SpeedPhish Framework 10 years ago

Auditing Tool

Wireshark 3.6.1 Released – What’s New!!

Wireshark 3.6.1 Released – What’s New!!

January 5, 2022 0 Comment

What is Wireshark? A latest version of Wireshark has been released recently, Wireshark 3.6.1 with several fixes and new addons,…

Copy as XMLHttpRequest BurpSuite Extension

Copy as XMLHttpRequest BurpSuite Extension

April 7, 2021 0 Comment

The extension adds a context menu to BurpSuite that allows you to copy multiple requests as Javascript’s XmlHttpRequest, which simplifies…

Shocker – A tool to find and exploit servers vulnerable to Shellshock

March 30, 2016 0 Comment

Shocker is a tool to find and exploit servers vulnerable to Shellshock Released as open source by NCC Group Plc…

Climber – Check UNIX/Linux Systems For Privilege Escalation

March 8, 2016 0 Comment

Automated auditing tool to check UNIX/Linux systems misconfigurations which may allow local privilege escalation. Dependencies python >= 2.7 python-crypto python-mako…

  • LinkedIn
  • Twitter
  • Facebook
  • RSS Feed

HackTheBox Badge

HTB Badge
Klook.com Klook.com

Recent Posts

  • Introducing Quick Machine Recovery: Microsoft’s Solution to Driver-Induced Blue Screens
  • DevToys: The Ultimate Swiss Army Knife for Developers and Security Analysts
  • How to Renew the Apple MDM Push Certificate
  • How to Create a New Apple ID for MDM – A Step-by-Step Guide
  • How to Install PowerShell on Windows, Linux, and macOS

Categories

  • Azure
  • DevOps
  • Docker
  • How To’s
  • Linux
  • Malware
  • Network Security
  • Powershell
  • Security







Klook.com
Follow on LinkedIn

© Copyright 2011 James Eduard