Ethical hacking is the practice of using hacking techniques to test the security of a computer system or network. Ethical hackers like myself try to find ways to break into a system in order to find security vulnerabilities that could be exploited by malicious hackers. This practice is also kn...
You'll learn how to perform evil twin attacks on targets using a wide variety of tools, and create a captive portal that effectively steals the login credentials. All the attacks in this course are highly practical and straight to the point. ...
BozoCrack - A silly & effective MD5 cracker in Ruby. Common-substr - Simple awk script to extract the most common substrings from an input text. Built for password cracking. Facebook-BruteForce - Bruteforce attack on Facebook account using python script. ForemanBrute - ForemanBrute allows you...
These tutorials will help you to integrate your app with an API backend running on another port, using fetch() to access it. Node Check out this tutorial. You can find the companion GitHub repository here. Ruby on Rails Check out this tutorial. You can find the companion GitHub repository ...
antiransom 3.02 A tool capable of detect and stop attacks of Ransomware using honeypots. blackarch-windows HomePage apache-users 2.1 This perl script will enumerate the usernames on a unix system that use the apache module UserDir. blackarch-scanner HomePage apacket 374.16e7036 Sniffer syn and ba...
offshore banks are domestic banks in a different jurisdiction. The practical ease of affecting physical gold and Bitcoins with policy is comparable. Bitcoins can be hidden using physical and also steganographic means, whereas gold does not benefit from steganography; in practice, however, this differe...
Nexpose– Commercial vulnerability and risk management assessment engine integrated with Metasploit, sold by Rapid7. BinGoo –Decrypt data enciphered using weak RSA keys, and recover private keys from public keys using a variety of automated attacks....
Push tactics often involve finding temporary “loopholes” and getting a competitive advantage by using them. These are examples we often hear/read about: AirBnB posting on Craigslist, Dropbox using free space for referrals,etc. That’s all good, but as in our example with an email campaign,...
We’re using the Ruby 1.9 lambda syntax (->) here. This is the same as using lambda but is a little shorter to type, although arguments are defined differently, outside the block. You can see this in thesearchscope above. It’s not necessary to use a lambda in every one of these ...
Hey! I am Kirill Platonov, a software developer, and indie hacker. I specialize in building and scaling Shopify Apps with Ruby on Rails, Hotwire and Polaris ViewComponents. I am currently building my portfolio of 5 Shopify Apps and maintaining a handful