Rose & Marinaldo

sábado, 9 de maio de 2020

How To Start PHP And MYSQL | The Best Server For PHP And MYSQL | Tutorial 1

›
Many of people want to start PHP programming embedded with MYSQL databases concepts. So i thought that I should start a series about PHP and...

JoomlaScan - Tool To Find The Components Installed In Joomla CMS, Built Out Of The Ashes Of Joomscan

›
A free and open source software to find the components installed in Joomla CMS, built out of the ashes of Joomscan. Features Scanning the Jo...

OSWA™

›
"The OSWA™-Assistant is a self-contained, no Operating System required, freely downloadable, standalone toolkit which is solely focused...

Learning Web Pentesting With DVWA Part 2: SQL Injection

›
In the last article  Learning Web Pentesting With DVWA Part 1: Installation , you were given a glimpse of SQL injection when we installed th...

Video Archives Of Security Conferences And Workshops

›
Just some links for your enjoyment List of security conferences in 2014 Video archives: AIDE (Appalachian Institute of Digital Evidence) 201...
sexta-feira, 8 de maio de 2020

HOW TO BECOME A CERTIFIED ETHICAL HACKER

›
7 Tips to become a hacker? It is very important for a hacker to learn different types of programming language such as C,C++,Python,Java,PHP ...

Tricks To Bypass Device Control Protection Solutions

›
Preface As I wrote in a previous blog post, I had an engagement last year where my task was to exfiltrate data from a workstation on some so...

Linux Command Line Hackery Series - Part 5

›
Welcome back to the Linux Command Line Hackery series, this is Part-V of the series. Today we are going to learn how to monitor and control ...

Linux Command Line Hackery Series: Part 2

›
Welcome back to Linux Command Line Hackery, yes this is Part 2 and today we are going to learn some new skills. Let's rock Let us first ...
‹
›
Página inicial
Ver versão para a web

Quem sou eu

Minha foto
Rose
Ver meu perfil completo
Tecnologia do Blogger.