MetaSploit tutorial for beginners
MetaSploit tutorial for beginners This MetaSploit tutorial for beginners is meant to be a starting guide on how to use MetaSploit if you have never used it before. It assumes…
MetaSploit tutorial for beginners This MetaSploit tutorial for beginners is meant to be a starting guide on how to use MetaSploit if you have never used it before. It assumes…
It (unexpectedly) works, first time, no messing! More info here: https://www.britishtelephones.com/t746.htm Dialing a mobile from it is a pain though!
I recently saw this tweet from kali linux https://twitter.com/kalilinux/status/1209615382224547840?s=19 on installing rootless nethunter on an unrooted android device. This is my attempt to do so. The tweet linked here: https://www.kali.org/docs/nethunter/nethunter-rootless/…
This time its a generic non-branded chinese bluetooth speaker. I got this one from amazon, for less than £10. Its fabric covered so looks good, and is very loud. It…
Ive been spurned by expensive headphones in the past, but still burn through them. This time I decided to get some cheap ($10) bluetooth earpod style headphones from China. Chinese…
Os Detection Techniques and OS fingerprinting Os Detection Techniques - Background information This is a list of Os Detection Techniques, with explanations for all the active and passive Os Detection…
We are driving from Glasgow to Kent to see my brother and his family, and Zoes sister and her family in Kent.Its the first time Im driving down, so we…
I have decided to start studying towards a CISSP and / or an OSCP, as part of that I saw an excellent blog post recommending to go through a lot…
Spidering a web application using website crawler software in kali linux There are lots of tools to spider a web application (an companies which are based on this tech, eg…