Thursday, 26 June 2025
  • Privacy Policy
  • Contact Us
  • My account
    • Checkout
    • Cart
James Eduard
  • Home
  • How To’s
  • Microsoft
    • Microsoft 365
    • Microsoft Defender
    • Microsoft Intune
    • Microsoft Entra
    • Microsoft Sentinel
    • Azure AD
  • Linux
    • CentOS
    • Debian
    • ElementaryOS
    • Fedora
    • Kali Linux
    • FreeBSD
    • Linuxmint
    • Redhat
    • RHEL
    • Open Suse
    • Ubuntu
  • MacOS
  • Cloud
    • VMWare
    • Azure
    • AWS
    • Cloudflare
    • DevOps
      • Dynatrace
      • Terraform
      • Docker
  • Security
    • Capture the Flag
      • HackTheBox
    • Hardware Hacking
    • Forensics Tools
    • Hacker Conference
    • InfoSec
    • Exploit

Breaking News

  • RootCON 9 – Hacker Conference [Activities] 10 years ago
  • RootCON9 Call for Papers 10 years ago
  • SPF – SpeedPhish Framework 10 years ago
  • REMnux – A Linux Toolkit for Reverse-Engineering and Analyzing Malware 10 years ago
  • Mr. Robot “Our Democracy has been Hacked” – Official Extended Trailer 10 years ago
  • How to Patch VENOM Vulnerability [CVE-2015-3456] on Linux 10 years ago

Vulnerability Analysis

Vulnerability Analysis

DefenseMatrix – Full security solution for Linux Servers

March 19, 2018 0 Comment

DefenseMatrix helps individuals and organizations who use Linux to secure their servers on various dimentions automatically. It makes securing a…

CVE-2017-17411: Linksys WVBR0 25 Command Injection

December 26, 2017 0 Comment

Recently a security researcher Ricky Lawshae from Trend Micro discover a critical vulnerability on Linksys Wireless Bridge WVBR0-25 this allows…

Acunetix Free Manual Pen Testing Tools

January 13, 2017 0 Comment

Acunetix Manual Tools allow penetration testers to further automated testing. Scan your websites SQL Injection & Blind SQL Injection Cross-site…

idb – iOS App Security Assessment Tool

December 14, 2016 0 Comment

idb is a tool to simplify some common tasks for iOS app security assessments and research. Please see the Documentationfor…

Shellsploit Framework – New Generation Exploit Development Kit

May 25, 2016 0 Comment

Shellsploit let’s you generate customized shellcodes, backdoors, injectors for various operating system. And let’s you obfuscation every byte via encoders.…

Doork – Google Dorks Passive Vulnerability Auditor

May 22, 2016 0 Comment

Doork is a open-source passive vulnerability auditor tool that automates the process of searching on Google information about specific website…

Mosca – Static analysis tool to find bugs like a grep unix command

January 17, 2016 0 Comment

Static analysis tool to find bugs like a grep unix command, egg modules is a config to find to vulnerabilities…

Wifi Arsenal – A pack of various usefull/useless tools for 802.11 hacking

October 23, 2015 0 Comment

WiFi arsenal is a pack of various usefull/useless tools for 802.11 hacking Short description: P0cL4bs/3vilTwinAttacker -Framework for Rogue Wi-Fi Access…

Heartbleed Scanner – Network Scanner for OpenSSL Memory Leak (CVE-2014-0160)

October 2, 2015 0 Comment

Heartbleed Scanner – Network Scanner for OpenSSL Memory Leak (CVE-2014-0160) -t parameter to optimize the timeout in seconds. -f parameter…

w3tw0rk / Pitbull Perl IRC Bot Remote Code Execution PoC Exploit by Shipcode

September 23, 2015 0 Comment

The Pitbull and w3tw0rk IRC bots contain a flaw that is triggered as input is not properly sanitized when handling…

Posts pagination

1 2 Next
  • LinkedIn
  • Twitter
  • Facebook
  • RSS Feed

HackTheBox Badge

HTB Badge
Klook.com Klook.com

Recent Posts

  • Introducing Quick Machine Recovery: Microsoft’s Solution to Driver-Induced Blue Screens
  • DevToys: The Ultimate Swiss Army Knife for Developers and Security Analysts
  • How to Renew the Apple MDM Push Certificate
  • How to Create a New Apple ID for MDM – A Step-by-Step Guide
  • How to Install PowerShell on Windows, Linux, and macOS

Categories

  • Azure
  • DevOps
  • Docker
  • How To’s
  • Linux
  • Malware
  • Network Security
  • Powershell
  • Security







Klook.com
Follow on LinkedIn

© Copyright 2011 James Eduard