MetaSploit tutorial for beginners
MetaSploit tutorial for beginners This MetaSploit tutorial for beginners is meant to be a starting guide on how to use MetaSploit if you have never used it before. It assumes…
MetaSploit tutorial for beginners This MetaSploit tutorial for beginners is meant to be a starting guide on how to use MetaSploit if you have never used it before. It assumes…
Jonny Brooks-Bartlett - Data Scientist at deliveroo They use predictive modelling and machine learning. Their hypothesis is "if they can show you more relevant places you will spend money" given…
Building a PWA vuejs app with wordpress API - Part 1 The aim in this is to make an offline-first PWA with vuejs / axios / bootstrap using wordpress as…
Os Detection Techniques and OS fingerprinting Os Detection Techniques - Background information This is a list of Os Detection Techniques, with explanations for all the active and passive Os Detection…
Continuing on from my original metasploit beginners tutorial, here is a slightly more advanced Metasploit tutorial on how to use metasploit to scan for vulnerabilities. The outcome of this tutorial…
It turns out that coding in php on android is possible (even if its not as good as on a mac, linux or even windows). In this blog post I'll…
This is a burp suite beginners tutorial. Burpsuite is a collection of tools, written in Java used to perform various network security related tasks. Burpsuite can be used as a…
I wrote a previous post about kali on the hi10, and promised a followup on Chuwi hi10 pro kali linux wifi fixes; here it is. The on-board wifi works out…
After trying Kali on the hi10 pro (its totally not ready for the bay-trail / cherry-trail platforms) I decided to give ubuntu on the chuwi hi10 pro a go (after…