Raspberry Pi hacking
This tutorial will show you how to make a Raspberry Pi hack tool by installing Kali on the Raspberry Pi - by the end of this guide you will have…
This tutorial will show you how to make a Raspberry Pi hack tool by installing Kali on the Raspberry Pi - by the end of this guide you will have…
Vagrant with sshfs. You can use sshfs in vagrant with only a private network. This is fine if you are doing all your devlopment from a single machine and dont…
Metasploitable background: What is metasploitable? "Metasploitable is a Virtual Machine that is built from the ground up with a large amount of security vulnerabilities. It is intended to be used…
service-oriented architecture and frameworks IntroductionPapazoglou, (2003) organised SOA in four architectural layers: Service Foundations, Service Composition, Service Management and Service Engineering and outlined a host of technologies that could be…
Continuing on from my original metasploit beginners tutorial, here is a slightly more advanced Metasploit tutorial on how to use metasploit to scan for vulnerabilities. The outcome of this tutorial…
It turns out that coding in php on android is possible (even if its not as good as on a mac, linux or even windows). In this blog post I'll…
This is a simple Vega scanner tutorial for beginners on XSS scanning with vega scanner in kali linux. Vega is an open-source web vulnerability scanner designed for finding security issues…
This is a short post on how to remove unused kernels in linux. I'm adding it here because I use it regularly and keep forgetting the commands - it might…
Blackarch on the chuwi hi10pro - prereq's a usb hub a usb flashdrive a usb mouse a usb wifi adaptor (at least for the initial setup) Download blackarch from https://blackarch.org/downloads.html…