Wagner

17 Added | 3 Magazines | 5 Likes | 2 Following | @WagnerSonaglio | Keep up with Wagner on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Wagner”

Exe2Image - A simple utility to convert EXE files to JPEG images and vice versa.

A simple utility to convert EXE files to PNG images and vice versa.<b><br>Putty.exe converted to an image.</b><b><br>Download Exe2Image</b>

Papua New Guinea

Como encontrar qualquer pessoa online

Se seus esforços para localizar parentes perdidos há muito tempo e músicos obscuros (ou qualquer outra pessoa que você está procurando na web) param …

NoSQLMap – Automated NoSQL MongoDB Exploitation Tool

NoSQLMap is an open source Python-based automated NoSQL MongoDB exploitation tool designed to audit for as well as automate injection attacks and …

Databases

Hackers invadem urnas eletrônicas após 1 hora de tentativas

Durante a conferência de hacking Def Con, que aconteceu em Las Vegas (EUA) na semana passada, diversos hackers levaram cerca de 1h30 para burlar …

Sandsifter checks your processor for secrets

Are you sufficiently paranoid? If you’re not, there’s now Sandsifter. This project, just announced at Defcon 2017, tests your x86 processor for hidden instructions and bugs. “Sandsifter has uncovered secret processor instructions from every major vendor; ubiquitous software bugs in disassemblers, …

Information Security

Reverse Engineering Framework: radare2

r2 is a rewrite from scratch of radare in order to provide a set of libraries and tools to work with binary files<p>Radare project started as a …

Cryptkeeper To Encrypt And Decrypt Folder In Linux

Your personal documents are stored in Linux system and you want to encrypt the documents (protect the folder with password) to avoid anyone to access …

Linux

Crack WPA/WPA2 Wifi Password Without Dictionary/Brute Fore Attack using Fluxion

Crack WPA/WPA2 Wifi Password Without Dictionary/Brute Fore Attack using Fluxion<p>Crack WPA/WPA2 Wifi Password Without Dictionary/Brute Fore Attack …

How to do arp poisoning / spoofing with Kali Linux 2016.2 | arpspoof | wireshark | steal passwords | sniff packets

First find the IP address of victim.<br>#ifconfig<p>Now check the arp table , it will show only router’s mac address.<br>#arp<p>Ping the victim machine and again …

CoreFreq – A Powerful CPU Monitoring Tool for Linux Systems

CoreFreq is a CPU monitoring program intended for the Intel 64-bits processor and supports architectures such as Atom, Core2, Nehalem, SandyBridge …

Linux

rtop – An Interactive Tool to Monitor Remote Linux Server Over SSH

rtop is a straightforward and interactive, remote system monitoring tool based on SSH that collects and shows important system performance values …

Linux

How to Check Remote Ports are Reachable Using ‘nc’ Command

A port is a logical entity which acts as a endpoint of communication associated with an application or process on an Linux operating system. It is …

Linux

Ebook: Kali Linux Wireless Penetration Testing: Beginner's Guide

The Linux environment is the ideal platform for security auditors and penetration testers because of the enormous artillery it provides them …