Blog

Latest news around the world

08

Aug'22

TCPFLOW 1.5.0 | by Simson L. Garfinkel

TCPFLOW 1.5.0 by Simson L. Garfinkel Downloads directory: http://digitalcorpora.org/downloads/tcpflow/ Installation Most common GNU/Linux distributions ship tcpflow in their repositories. So …

Read More

05

Aug'22

Hate Speech Models | Natural Language Processing for OSINT & Threat Analysis [FREE COURSE CONTENT]

  This video tutorial shows how to train the model in order to recognize hate speech sentences. It is a …

Read More

04

Aug'22

How to Integrate Biometric Authentication into Your Mobile App

  App developers are always striving to make mobile applications more user-friendly and easier to use. They are in constant …

Read More

01

Aug'22

Beagle | by Omer Yampel

Beagle By Omer Yampel About Beagle Installation Docker Python Package Configuration Web Interface Uploading Data Browsing Existing Graphs Graph Interface …

Read More

25

Jul'22

Android-CleanArchitecture | by Fernando Cejsa

Android-CleanArchitecture by Fernando Cejsa Introduction This is a sample app that is part of a blog post I have written …

Read More

22

Jul'22

Weighing the Security Benefits & Drawbacks of Open-Source

These days, open-source software can be found everywhere as innovation is unmatched among organizations. That being said, the accessibility to …

Read More

18

Jul'22

AndroidUSBCamera | by jiangdongguo

AndroidUSBCamera by jiangdongguo AUSBC   Flexible and useful UVC camera engine on Android platform, you can use it to simply open …

Read More

11

Jul'22

Portable mobile app traffic analysis | by Christian Kisutsa

Portable mobile app traffic analysis by Christian Kisutsa One of the phases of mobile application pentesting is to analyze network …

Read More

04

Jul'22

mimikatz | by Benjamin DELPY

mimikatz by Benjamin DELPY mimikatz is a tool I've made to learn C and make somes experiments with Windows security. It's now well …

Read More

27

Jun'22

Infrastructure testing with MSF | by Karol Mazurek

Infrastructure testing with MSF by Karol Mazurek Penetration testing of the corporate network using Metasploit INTRODUCTION During a full penetration …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013