Rose & Marinaldo
sábado, 9 de maio de 2020
How To Start PHP And MYSQL | The Best Server For PHP And MYSQL | Tutorial 1
›
Many of people want to start PHP programming embedded with MYSQL databases concepts. So i thought that I should start a series about PHP and...
JoomlaScan - Tool To Find The Components Installed In Joomla CMS, Built Out Of The Ashes Of Joomscan
›
A free and open source software to find the components installed in Joomla CMS, built out of the ashes of Joomscan. Features Scanning the Jo...
OSWA™
›
"The OSWA™-Assistant is a self-contained, no Operating System required, freely downloadable, standalone toolkit which is solely focused...
Learning Web Pentesting With DVWA Part 2: SQL Injection
›
In the last article Learning Web Pentesting With DVWA Part 1: Installation , you were given a glimpse of SQL injection when we installed th...
Video Archives Of Security Conferences And Workshops
›
Just some links for your enjoyment List of security conferences in 2014 Video archives: AIDE (Appalachian Institute of Digital Evidence) 201...
sexta-feira, 8 de maio de 2020
HOW TO BECOME A CERTIFIED ETHICAL HACKER
›
7 Tips to become a hacker? It is very important for a hacker to learn different types of programming language such as C,C++,Python,Java,PHP ...
Tricks To Bypass Device Control Protection Solutions
›
Preface As I wrote in a previous blog post, I had an engagement last year where my task was to exfiltrate data from a workstation on some so...
Linux Command Line Hackery Series - Part 5
›
Welcome back to the Linux Command Line Hackery series, this is Part-V of the series. Today we are going to learn how to monitor and control ...
Linux Command Line Hackery Series: Part 2
›
Welcome back to Linux Command Line Hackery, yes this is Part 2 and today we are going to learn some new skills. Let's rock Let us first ...
‹
›
Página inicial
Ver versão para a web