Thursday, January 23, 2020
Home Tags SAM

Tag: SAM

Must Need

PasteJacker : Hacking Systems With The Automation Of PasteJacking Attacks

PasteJacker the main purpose of the tool is automating (PasteJacking/Clipboard poisoning/whatever you name it) attack with collecting all the known tricks used in this...
JShielder : Hardening Script for Linux Servers/ Secure LAMP-LEMP Deployer/ CIS Benchmark G

JShielder : Hardening Script for Linux Servers/ Secure LAMP-LEMP Deployer/ CIS...

JSHielder is an Open Source Bash Script developed to help SysAdmin and developers secure there Linux Servers in which they will...
Rootstealer

Rootstealer – Trick To Inject Commands On Root Terminal

Rootstealer is an example of new attack using X11. This tool is used to detect when linux users open terminal with root and inject...

IPv4Bypass – Using IPv6 to Bypass Security

IPv4Bypass bypass security using IPv6. Dependences python2.7 nmap python-nmap termcolor Example on how to run the tool $ python bypass.py -i eth0 -r 10.5.192.0/24 $ python...
SQLMap : Automatic SQL Injection & Database Takeover Tool

SQLMap : Automatic SQL Injection & Database Takeover Tool

SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over...

Computer Science Extended Essays: 5 Sources to Get Writing Tips From

The success of any writing assignment is strongly dependent on its discipline. Thus, many students find computer science utterly complicated. There are many things to...
Google Play Store

Malicious Apps Change Their Name To Be Back On Google Play...

The Google Play Store has a notoriety for being the most secure place online to get Android applications, and Google completes a great job...