Uncategorized

14

Feb'22

Android tools | by Shivam Kumar Jha

Android tools by Shivam Kumar Jha Collection of scripts to help with Android ROM stuff. Setup: chmod +x setup.sh sudo …

Read More

01

Nov'21

Attack-Surface-Framework - Tool To Discover External And Internal Network Attack Surface | by ZION3R

Attack-Surface-Framework - Tool To Discover External And Internal Network Attack Surface by ZION3R ASF aims to protect organizations acting as …

Read More

08

Jun'21

Be Careful with CompletableFuture.applyToEither and Exceptions | by Grzegorz Piwowarek

Be Careful with CompletableFuture.applyToEither and Exceptions by Grzegorz Piwowarek In this article, we’ll revisit the CompletableFuture.applyToEither method and try to …

Read More

03

Mar'21

What does security mean #3: What does security mean for your Linux kernel? | by Roland Gharfine

What does security mean #3: What does security mean for your Linux kernel? by Roland Gharfine “I have a plan …

Read More

04

Dec'20

IOS 1-DAY HUNTING: UNCOVERING AND EXPLOITING CVE-2020-27950 KERNEL MEMORY LEAK

IOS 1-DAY HUNTING: UNCOVERING AND EXPLOITING CVE-2020-27950 KERNEL MEMORY LEAK by  Fabien Perigaud  Back in the beginning of November, Project …

Read More

03

Apr'20

Data Quality and Quantity – How to Get the Best of Both Worlds, Part 1 | By Heather Mahalik

Data Quality and Quantity – How to Get the Best of Both Worlds, Part 1 Do Other Tools Really Parse …

Read More

02

Apr'20

How Cybercriminals Use COVID-19 Panic to Infect and Scam Users | By Dominique René

How Cybercriminals Use COVID-19 Panic to Infect and Scam Users The dreadful coronavirus is taking the world by storm, and …

Read More

04

Feb'20

How Domain Monitoring Services Can Help Enhance Network Defense Strategies | By Jonathan Zhang

| sponsored post | How Domain Monitoring Services Can Help Enhance Network Defense Strategies As cyber threats continue to advance …

Read More

04

Nov'19

CRYPTO & DATA ERASURE: After forensic analysis drives should be securely wiped | By Paul Katzoff

| sponsored post | CRYPTO & DATA ERASURE: After forensic analysis drives should be securely wiped Executive Summary Disk encryption …

Read More

19

Jul'18

Transferring Backdoor Payloads with BMP Image Pixels | By Damon Mohammadbagher

Transferring Backdoor Payloads with BMP Image Pixels In this article, I want to talk about BMP files and how you …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013