When autocomplete results are available use up and down arrows to review and enter to select. Touch device users, explore by touch or with swipe gestures.

linux

Collection by Tung Truong

375 
Pins
 • 
223 
Followers
Tung Truong
How To Build A Portable Hacking Station With A Raspberry Pi - The Raspberry Pi Is A Small Credit Card Sized Computer That Doesnt Require A Lot Of Power To Use When You Combine The Raspberry Pi And Kali Linux Together You Get A Super Portable Network Electronics Projects, Computer Projects, Diy Electronics, Computer Build, Computer Hacking, Electrical Projects, Computer Repair, Gaming Computer, Diy Tech

How to Build a Portable Hacking Station with a Raspberry Pi and Kali Linux

Cracking Wi-Fi passwords, spoofing accounts, and testing networks for exploits is all fun enough, but if you want to take the show on the road, you’ll want an easily portable rig. Enter Kali Linux and the Raspberry Pi.

PhpSploit - Stealth Post-Exploitation Framework - Leading source of Security Tools, Hacking Tools, CyberSecurity and Network Security ☣ - Life Hacks Computer, Computer Coding, Computer Internet, Computer Programming, Computer Tips, Best Hacking Tools, Learn Hacking, Hacking Websites, Software Security

PhpSploit - Stealth Post-Exploitation Framework

PhpSploit is a remote control framework, aiming to provide a stealth interactive shell-like connection over HTTP between client and we...

- Tool To Find Admin Login Pages And EAR Vulnerabilites Leading source of Security Tools, Hacking Tools, CyberSecurity and Network Security ☣Leading source of Security Tools, Hacking Tools, CyberSecurity and Network Security ☣ Computer Coding, Computer Technology, Computer Programming, Computer Tips, Computer Hacker, Security Tools, Computer Security, Home Security Systems, Best Hacking Tools

Breacher - Tool To Find Admin Login Pages And EAR Vulnerabilites

A script to find admin login pages and EAR vulnerabilites. Features Multi-threading on demand Big path list (798 paths) Supports ph...

HACKING: Beginner's Crash Course - Essential Guide to Practical: Computer Hacking, Hacking for Beginners, & Penetration Testing (Computer Systems, Computer Programming, Computer Science Book 1 - Hacks Technology Hacks, Computer Technology, Computer Science, Technology Careers, Medical Technology, Energy Technology, Computer Coding, Computer Programming, Computer Hacking

Save BIG with €9.26 .COMs from GoDaddy!

Get your own corner of the Web for less! Register a new .COM for just €9.26 for the first year and get everything you need to make your mark online — website builder, hosting, email, and more.

Amazing Linux Commands you should know. The Linux Commands Reference Cheat Sheet Source by techgeekroy Computer Coding, Computer Technology, Computer Programming, Computer Science, Medical Technology, Energy Technology, Technology Gadgets, Iphone Information, Cyber Security Awareness

The Linux Commands Reference Cheat Sheet

This simple cheat sheet will help you get comfortable with the Linux command line terminal in no time.

Devploit is a simple python script to Information Gathering. Osint Tools, Best Hacking Tools, Web Safety, J Names, Open Source Intelligence, Hobbies For Adults, Coding Languages, Security Tools, Android Hacks

Devploit v3.6 - Information Gathering Tool

Devploit is a simple python script to Information Gathering.

Umbrella – A Phishing Dropper designed to Pentest. Computer Hacker, Computer Internet, Computer Setup, Disruptive Technology, Computer Technology, Computer Science, Best Hacking Tools, Learn Hacking, Security Tools

Umbrella – A Phishing Dropper designed to Pentest. – Security List Network™

Umbrella – A Phishing Dropper designed to Pentest. | Security List Network™

Forensic tool for iOS that dump every critical information from a device with a trusted computer. Computer Forensics, Computer Technology, Computer Science, Cell Phone Hacks, Smartphone Hacks, Android Security, Mobile Security, Hack Facebook, Account Facebook

Forensic tool for iOS that dump every critical information from a device with a trusted computer. – Security List Network™

Forensic tool for iOS that dump every critical information from a device with a trusted computer. | Security List Network™

Sometime we do external penetration testing and when we compromise the remote target we would like to explore the internal network behi. Computer Technology, Computer Programming, Computer Science, Technology Gadgets, Computer Build, Computer Tips, Medical Technology, Energy Technology, Web Safety

VPNPivot - Explore Internal Networks

Sometime we do external penetration testing and when we compromise the remote target we would like to explore the internal network behi...

Gcat – A fully featured backdoor that uses Gmail as a C&C server. Changelog + Added some crazy 1337 ascii art. + Added an upload command. Computer Class, Computer Coding, Computer Technology, Computer Programming, Computer Science, Computer Tips, Programming Languages, Kali Linux Hacks, Kali Linux Tutorials

Updates Gcat – A fully featured backdoor that uses Gmail as a C&C server. – Security List Network™

Updates Gcat – A fully featured backdoor that uses Gmail as a C&C server. | Security List Network™

PenBox – A Penetration Testing Framework. Technology Hacks, Computer Technology, Computer Science, Security Tools, Computer Security, Best Hacking Tools, Web Safety, Computer Coding, Computer Hardware

PenBox v2 – A Penetration Testing Framework. – Security List Network™

PenBox v2 – A Penetration Testing Framework. | Security List Network™

Protobuf-Inspector - Tool To Reverse-Engineer Protocol Buffers With Unknown Definition – Cyber Security Hobbies For Men, Hobbies That Make Money, Computer Programming, Computer Science, Fisher, Cyber Security Awareness, News Website, Security Application, Linux Operating System

Protobuf-Inspector - Tool To Reverse-Engineer Protocol Buffers With Unknown Definition

Simple program that can parse Google Protobuf encoded blobs (version 2 or 3) without knowing their accompanying definition. It will print...

Smali Code Injector (SCI)is an Automate assembly code (smali) injection within Android applications. Android Security, Mobile Security, Computer Security, Best Hacking Tools, Android Applications, Security Tools, Keyboard Shortcuts, Computer Science, Interesting Stuff

Reverse engineering framework working at the assembly (SMALI) level. – Security List Network™

sci – Reverse engineering framework working at the assembly (SMALI) level. | Security List Network™

Medusa released : is a speedy, parallel, and modular, login brute-forcer. Computer Internet, Computer Science, Web Safety, Data Structures, Computer Security, Tech Toys, Tech Hacks, Medusa, Interesting Stuff

Medusa v-2.2rc1 released : is a speedy, parallel, and modular, login brute-forcer. – Security List Network™

Medusa v-2.2rc1 released : is a speedy, parallel, and modular, login brute-forcer. | Security List Network™