Troy

8 Flips | 2 Magazines | 24 Likes | @Troy4msl | Keep up with Troy on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Troy”

Using NMAP NSE for Identifying Vulnerabilities

When I sat for the OSCP exam, automated vulnerability scanners were banned. However, the usage of nmap nse script was allowed. Nmap has built-in …

Hacking Tools List for Hackers & Security Professionals

Penetration testing & Hacking Tools Tools are more often used by security industries to test the vulnerabilities in network and applications. Here …

Algorithms Explained: Recursion

If you’re just starting out with programming you may have heard the word recursion being thrown around. You may have even come across problem …

Programming

30 Useful ‘ps Command’ Examples for Linux Process Monitoring

ps (processes status) is a native Unix/Linux utility for viewing information concerning a selection of running processes on a system: it reads this …

Commix v1.4 – Automatic All-in-One OS Command Injection and Exploitation Tool.

<b>Changelog v1.4-20161017:</b><br>* Added: Support on crawler for checking target for the existence of ‘sitemap.xml’.<br>* Revised: The payload for Ruby …

Command Injection Exploiter: Commix

<b>UPDATE:</b> Command Injection Exploiter: Commix v1.4-20161017 Released<p>Commix (short for [comm]and [i]njection e[x]ploiter) is a simple environment that …

Forensics

Anatomy of Exploit - World of Shellcode Part 1

The content has been created by floriano, he reserved all the rights.<br>Introduction On Exploits<br>Nowadays the word exploit is becoming frightened, …

Collection Of Free Computer Forensic Tools

Disktoolsanddatacapture<p>Name<p>From<p>Description<p>DumpIt<p>MoonSols<p>Generates physical memory dump of Windows machines, 32 bits 64 bit. Can run from a USB flash …