Pages
Posts
Anti-Forensics
Code Snippets
- DotNetNuker – Decrypt DotNetNuke Web Application Passwords
- Enumerate Subdomains (hostnames) using the Requests Library
- Iterate Through Files and Generate File Hash (MD5 and SHA256) with Walrus Operator
- Python Faker – Create Fake Data Using Python
- Python Socket Programming – Simple Bidirectional Communication
- Python wpnuker a collection of WordPress Pentesting Tools
- Scrape Google SERPs with Python
- Scrape Pastebin.com with Python
- Simple Reverse Proxy (Reverse Shell) localhost Example
- Spin the Content of a Message in Python
- Symmetric Encryption – Bidirectional Python Socket
- TryHackMe – SimpleCTF (easyCTF) – CVE-2019-9053 – Updated to Python 3
Cybersecurity News
Digital Forensics
Information Security
- DotNetNuker – Decrypt DotNetNuke Web Application Passwords
- Enumerate Subdomains (hostnames) using the Requests Library
- Exploitation of Cellebrite UFED
- Iterate Through Files and Generate File Hash (MD5 and SHA256) with Walrus Operator
- Python Faker – Create Fake Data Using Python
- Python wpnuker a collection of WordPress Pentesting Tools
- Simple Reverse Proxy (Reverse Shell) localhost Example
- Symmetric Encryption – Bidirectional Python Socket
- the grugq – Cyber Warfare (Video)
Information Technology
Internet Marketing
Legal/Law
- Federal Bureau of Investigation Terminology – “A”
- Federal Bureau of Investigation Terminology – “B”
- Federal Bureau of Investigation Terminology – “D”
- Federal Bureau of Investigation Terminology – “E”
- Federal Bureau of Investigation Terminology – “F”
- Federal Bureau of Investigation Terminology – “G”
- Federal Bureau of Investigation Terminology – “H”
- Federal Bureau of Investigation Terminology – “C”
- Federal Bureau of Investigation Terminology – “I”
- Federal Bureau of Investigation Terminology – “L”
- Federal Bureau of Investigation Terminology – “M”
- Federal Bureau of Investigation Terminology – “N”
- Federal Bureau of Investigation Terminology – “O”
- Federal Bureau of Investigation Terminology – “O”
- Federal Bureau of Investigation Terminology – “P”
- Federal Bureau of Investigation Terminology – “R”
- Federal Bureau of Investigation Terminology – “S”
- Federal Bureau of Investigation Terminology – “T”
- Federal Bureau of Investigation Terminology – “U”
- Federal Bureau of Investigation Terminology – “W”
- Mail and Email Openings
- The Blind Faith Program
Other
- A Vulnerability in pkexec Allows Privileged Program Execution (Privilege Escalation)
- Docker Desktop Will Remain Free for Some Users
- DotNetNuker – Decrypt DotNetNuke Web Application Passwords
- Enumerate Subdomains (hostnames) using the Requests Library
- Federal Bureau of Investigation Terminology – “A”
- Federal Bureau of Investigation Terminology – “B”
- Federal Bureau of Investigation Terminology – “D”
- Federal Bureau of Investigation Terminology – “E”
- Federal Bureau of Investigation Terminology – “F”
- Federal Bureau of Investigation Terminology – “G”
- Federal Bureau of Investigation Terminology – “H”
- Federal Bureau of Investigation Terminology – “C”
- Federal Bureau of Investigation Terminology – “I”
- Federal Bureau of Investigation Terminology – “L”
- Federal Bureau of Investigation Terminology – “M”
- Federal Bureau of Investigation Terminology – “N”
- Federal Bureau of Investigation Terminology – “O”
- Federal Bureau of Investigation Terminology – “O”
- Federal Bureau of Investigation Terminology – “P”
- Federal Bureau of Investigation Terminology – “R”
- Federal Bureau of Investigation Terminology – “S”
- Federal Bureau of Investigation Terminology – “T”
- Federal Bureau of Investigation Terminology – “U”
- Federal Bureau of Investigation Terminology – “W”
- Protected: Hide Traffic Origin
- Iterate Through Files and Generate File Hash (MD5 and SHA256) with Walrus Operator
- Mail and Email Openings
- Player Spotlight – Michael A. Brodack (FBI)
- Python Faker – Create Fake Data Using Python
- Python Socket Programming – Simple Bidirectional Communication
- Python wpnuker a collection of WordPress Pentesting Tools
- Scrape Google SERPs with Python
- Scrape Pastebin.com with Python
- Simple Reverse Proxy (Reverse Shell) localhost Example
- Spin the Content of a Message in Python
- Symmetric Encryption – Bidirectional Python Socket
- The Blind Faith Program
- The FBI’s Changing Model
- TryHackMe – SimpleCTF (easyCTF) – CVE-2019-9053 – Updated to Python 3