Profile cover photo
Profile photo
Cyber Security Training
7 followers -
About US
About US

7 followers
About
Posts

Post has attachment
There is no open source community quite as large and dedicated as Linux, but even then, it would be unwise to think that the OS is impenetrable. Since its inception in the early 90s, the Linux operating system has experienced its share of vulnerabilities,…
Add a comment...

Post has attachment
Note: If you are looking for a simple Web-based CTF then my advise would be to not read this as it’ll affect your eyes as there is a lot of assembly dump down there which you won’t be able to handle.   Hi, I go by the alias Haxor_s007 and today’s…
Add a comment...

Post has attachment
Any device which is connected to IOT is considered as beneficial in the person’s life. IOT stands for the internet of things and plays an essential role to serve the people. We can see anything like an alarm clock or a car, every IOT connected device…
Add a comment...

Post has attachment
Masscan has been around for some time now and already it’s in use by pentesters all around. It’s a reconnaissance tool which can transmit up to 10 million packets per second. It uses asynchronous transmission & a custom TCP/IP stack. So different threads…
Add a comment...

Post has attachment
Biometrics is a system of identifying individuals by their physical and behavioral characteristics. The person’s unique measurements are analyzed and recorded in a profile on the computer, which is used to confirm an identity automatically. Biometrics is…
Add a comment...

Post has attachment
The blockchain is one of the most powerful technologies to create and manage a public ledger of digital transactions, which are immutable to any kind of changes. This technology is used for the encrypted and secure transactions of valuable digital data…
Add a comment...

Post has attachment
Add a comment...

Post has attachment
Add a comment...

Post has attachment
Overview: Unicornscan is a new information gathering and correlation engine built for and by members of the security research and testing communities. It was designed to provide an engine that is Scalable, Accurate, Flexible, and Efficient. It is released…
Add a comment...

Post has attachment
Add a comment...
Wait while more posts are being loaded