Thursday, 3 July 2025
  • Privacy Policy
  • Contact Us
  • My account
    • Checkout
    • Cart
James Eduard
  • Home
  • How To’s
  • Microsoft
    • Microsoft 365
    • Microsoft Defender
    • Microsoft Intune
    • Microsoft Entra
    • Microsoft Sentinel
    • Azure AD
  • Linux
    • CentOS
    • Debian
    • ElementaryOS
    • Fedora
    • Kali Linux
    • FreeBSD
    • Linuxmint
    • Redhat
    • RHEL
    • Open Suse
    • Ubuntu
  • MacOS
  • Cloud
    • VMWare
    • Azure
    • AWS
    • Cloudflare
    • DevOps
      • Dynatrace
      • Terraform
      • Docker
  • Security
    • Capture the Flag
      • HackTheBox
    • Hardware Hacking
    • Forensics Tools
    • Hacker Conference
    • InfoSec
    • Exploit

Breaking News

  • SPF – SpeedPhish Framework 10 years ago
  • Facebook CTF is Now Open Source! 9 years ago
  • RootCON9 Call for Papers 10 years ago
  • XSSYA – Cross Site Scripting Scanner & Vulnerability Confirmation 10 years ago
  • BruteX – Automatically Brute Force all services running on a Target 10 years ago
  • RootCON 9 – Hacker Conference [Activities] 10 years ago

Web Application

Web Application

Facebook CTF is Now Open Source!

May 16, 2016 0 Comment

The Facebook CTF is a platform to host Jeopardy and “King of the Hill” style Capture the Flag competitions. How…

Weeman v1.7 – HTTP Server for Phishing

May 3, 2016 0 Comment

HTTP server for phishing in python. (and framework) Usually you will want to run Weeman with DNS spoof attack. (see…

SQLMap – Automatic SQL Injection And Database Takeover Tool

February 24, 2016 0 Comment

sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and…

VBScan – a Black Box vBulletin Vulnerability Scanner

February 8, 2016 0 Comment

VBScan is an opensource project in perl programming language to detect VBulletin CMS vulnerabilities and analyses them Why VBScan ?…

Bluto – DNS Recon, DNS Zone Transfer, and Email Enumeration

November 13, 2015 0 Comment

BLUTO DNS recon | Brute forcer | DNS Zone Transfer | Email Enumeration The target domain is queried for MX…

WordPress XML RPC Brute Force Exploit by 1N3

October 19, 2015 0 Comment

WordPress XML-RPC Brute Force Amplification PoC by 1N3, this is a small PoC exploit to launch a brute force amplification…

B374K – PHP Webshell with handy features

October 19, 2015 0 Comment

This PHP Shell is a useful tool for system or web administrator to do remote management without using cpanel, connecting…

Weeman – HTTP Server for Phishing

October 3, 2015 0 Comment

Weeman – HTTP server for phishing in python. Weeman has support for most of the (bigest) websites. Usually you will…

WPHardening – Fortify the security of any WordPress Installation

September 23, 2015 0 Comment

Installation: Installing WPHardening requires you to execute one console command: $ pip install -r requirements.txt Usage: $ python wphardening.py -h…

Weevely3 – Weaponized PHP Web Shell

September 21, 2015 0 Comment

Weevely is a command line web shell dynamically extended over the network at runtime designed for remote administration and pen…

Posts pagination

Previous 1 2 3 Next
  • LinkedIn
  • Twitter
  • Facebook
  • RSS Feed

HackTheBox Badge

HTB Badge
Klook.com Klook.com

Recent Posts

  • Introducing Quick Machine Recovery: Microsoft’s Solution to Driver-Induced Blue Screens
  • DevToys: The Ultimate Swiss Army Knife for Developers and Security Analysts
  • How to Renew the Apple MDM Push Certificate
  • How to Create a New Apple ID for MDM – A Step-by-Step Guide
  • How to Install PowerShell on Windows, Linux, and macOS

Categories

  • Azure
  • DevOps
  • Docker
  • How To’s
  • Linux
  • Malware
  • Network Security
  • Powershell
  • Security







Klook.com
Follow on LinkedIn

© Copyright 2011 James Eduard