George Quitugua

28 Added | 3 Magazines | 56 Likes | 1 Following | 4 Followers | @GeorgeQuitugua | Keep up with George Quitugua on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “George Quitugua”

Information Security

How to add version control for your Linux /etc directory

The /etc directory is one of the most crucial in your Linux servers. Here's how to add a bit of version control to /etc, so you can always be on top …

Linux

8 Practical Examples of Linux Xargs Command for Beginners

The Linux xargs command may not be a hugely popular command line tool, but this doesn't take away the fact that it's extremely useful, especially …

Linux
Linux

Meet Pupy, a Brand New In-Memory Remote Access Tool (RAT)

<b>Developers never stand still, and regardless of whether they are penetration testers or malware creators, new hacking tools always hit the market on</b> …

Hacking tool swipes encrypted credentials from password manager | Ars Technica

"KeeFarce" targets KeePass, but virtually all password managers are vulnerable.<p>Using a password manager is one of the biggest ways that average …

Information Security

How-to Penetration Testing and Exploiting with Metasploit + Armitage + msfconsole

How to Build a Portable Hacking Station with a Raspberry Pi and Kali Linux

GIF<p>Cracking Wi-Fi passwords, spoofing accounts, and testing networks for exploits is all fun enough, but if you want to take the show on the road, …

Infernal Twin – Automatic Wifi Hacking Tool

Infernal Twin is an automatic wifi hacking tool, basically a Python suite created to aid penetration testers during wireless assessments, it …

Wi-Fi
JavaScript

New attacks on Network Time Protocol can defeat HTTPS and create chaos | Ars Technica

Exploits can be used to snoop on encrypted traffic and cause debilitating outages.<p>Serious weaknesses in the Internet's time-synchronization mechanism …

Information Security

Xtreme Vulnerable Web Application (XVWA) - Practice Hacking Attacks

XVWA is a badly coded web application written in PHP/MySQL that helps security enthusiasts to learn application security. It’s not advisable to host …

Information Security

Driver Who Swerved And Hit A Motorcycle: 'I Don't Care'

A motorcyclist got more than he bargained for while making a pass on a two-lane road on Saturday when a driver swerved and hit the bike, sending both …

Filmmaking

How to Hack Wi-Fi: Get Anyone's Wi-Fi Password Without Cracking Using Wifiphisher

Welcome back, my tenderfoot hackers!<p>Do you need to get a Wi-Fi password but don't have the time to crack it? In previous tutorials, I have shown how …

Wi-Fi
Forensics

Top 5 Password Cracking Tools

Password cracking tools are often refereed to as password recovery tools used to guess or restore a password from a data transmission system. …

Forensics

Troy’s ultimate list of security links

I’ve got a heap of resources I constantly come back to in talks, workshops and just during the course of my everyday work. Frankly, I have trouble …

Information Security

Top 5 Motorcycle Riding Tips

Becoming a better motorcycle rider is about continually honing your skills. These skills are sometimes obvious, and other times not.<p>Here we have put …

Evil FOCA - MITM, DoS, DNS Hijacking in IPv4 and IPv6 Penetration Testing Tool

Evil Foca is a tool for security pentesters and auditors whose purpose it is to test security in IPv4 and IPv6 data networks. The tool is capable of …

Linux

Using testssl.sh , Author: Basil Alawi S.Taher

Testssl project has announced the release of testssl 2.6. testssl.sh is a free command line tool which checks a server's service on any port for the …

Command-line

Don't launch that file Adobe Reader!, Author: Didier Stevens

Maybe you read my PDF + DOC malicious document diary entry, or maybe even you tested your system with my PDF + DOC test file, and maybe you wondered …

Adobe Acrobat

Top 3 Forensic Examination Tools for Linux

Ethical Hacking<p>8:27 AM EH Tools, Forensic, Linux<p>Computer forensics and evidence management are the most important topic and very important aspect, …

Forensics

Discover - Custom bash scripts used to automate various pentesting tasks

For use with Kali Linux. Custom bash scripts used to automate various pentesting tasks.<p><b>Download, setup & usage</b><p>git clone …

Forensics

The Top Ten Hacker Tools of 2015

List of top ten hacker tools of 2015<p>Every task requires a good set of tools.This because having right tools in hand one can save much of its energy …

OWASP ZSC Shellcoder - Generate Customized Shellcodes

<b>OWASP ZSC</b> is an open source software in python language which lets you generate customized shellcodes for listed operation systems. This software can …

Linux