woof

121 Added | 4 Magazines | 14 Likes | 7 Following | 10 Followers | @woofcubatl | Keep up with woof on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “woof”

How To: Create Custom Wordlists for Password Cracking Using the Mentalist

Beginners learning brute-forcing attacks against WPA handshakes are often let down by the limitations of default wordlists like RockYou based on …

White Hat

How To: Run Kali Linux as a Windows Subsystem

Kali Linux is known as being the de facto penetration-testing Linux distribution but can be a pain to use as an everyday OS — even more of a pain if …

Linux

How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack

While Wi-Fi networks can be set up by smart IT people, that doesn't mean the users of the network are similarly tech-savvy. We'll demonstrate how an …

White Hat

VPN 101 – Part 1: What You Need to Know to Stay Safe and Protect Your Privacy Online

<i>Submitted by Brook Stein</i>The Internet is a wonderful thing. But we all know there are also risks lurking around every corner. We want to protect …

Information Systems

New AndroRAT Exploits Dated Privilege Escalation Vulnerability, Allows Permanent Rooting

<b>by Veo Zhang, Jason Gu, and Seven Shen</b>Trend Micro detected a new variant of Android Remote Access Tool (AndroRAT) (identified as …

Cybersecurity

Veil is private browsing for the ultra-paranoid

If you’re worried about someone finding out what you’re pointing your browser at, there are plenty of options for keeping it secret, with varying levels of difficulty and effectiveness. Veil takes things further than perhaps any other anonymous browsing method by masking the page you’re viewing not …

Privacy

How To: Hack Your Neighbor with a Post-It Note, Part 1 (Performing Recon)

Using just a small sticky note, we can trigger a chain of events that ultimately results in complete access to someone's entire digital and personal …

How To: Scan Websites for Potential Vulnerabilities Using Vega in Kali Linux

Withstanding an attack from a motivated hacker is one of most important responsibilities a system administrator must undertake. This is especially …

Information Security

Hacking Tools List for Hackers & Security Professionals

Penetration testing & Hacking Tools Tools are more often used by security industries to test the vulnerabilities in network and applications. Here …

Information Security

We Just Found the Tiny House of Your Dreams

Who knew it was possible to fit this much charm in 396 square feet?<p>To all those tiny houses outside of the South, we don’t want to say we told you …

Country Lifestyle

How to Download Windows 10 For Free, Even in 2018 - ExtremeTech

By on January 4, 2018 at 2:45 pm<p>This site may earn affiliate commissions from the links on this page. Terms of use.<p>Ever since Microsoft launched …

Complete Penetration Testing Tool List for Security Professionals

Penetration testing is the practice of launching authorized, simulated attacks against computer systems and their physical infrastructure to expose …

Information Security

Your DNS settings may be giving up your privacy

Make certain you're not leaking private info via your DNS. Here's how!We've spoken about the merits of having a VPN (virtual private network) to …

OnePlus has been caught harvesting personally identifiable information from users’ devices- Technology News, Firstpost

Just when it seems like the dust around the <b>controversial compromises</b> that went into the <b>OnePlus 5</b> has had a chance to settle, another controversy pops …

Privacy

Yuki Chan – Automated Penetration Testing Tool

Yuki Chan is an Automated Penetration Testing Tool that carries out a whole range of standard security auditing tasks automatically. It’s highly …

Forensics

Kali Linux 2017.2 – New Tools Overview

Last week, Kali announced the release of Kali Linux 2017.2! The new version is a collection of all updates and fixes since the last release, but also …

Linux

The Windows Malware Analysis Distribution: flare-vm

FLARE VM is a freely available and open sourced Windows-based security distribution designed for reverse engineers, malware analysts, incident …

The Loopix Anonymity System Wants to Be a More Secure Alternative to Tor

Loopix is a new anonymity network developed by a group of researchers from University College London (UCL) that comes with all the good parts of …

IT security

How To: Exploring Kali Linux Alternatives: How to Get Started with BlackArch, a More Up-to-Date Pentesting Distro

In 2013, Offensive Security released Kali Linux, a rebuild of BackTrack Linux derived from Debian. Since then, Kali has gone on to become somewhat of …

Linux

[ANN]❁ KORECoin- Tor Service Nodes, Browser, VoIP, Aether OS, KOREPhone, KOREbay

<b>The KORE Team's visions, desires and Ideology is to contribute to the world in it's current needs and upcoming challenges.</b><b><br>Here are a few projects in</b> …

Privacy

How to permanently mount a Windows share on Linux

If you get tired of having to remount Windows shares when you reboot your Linux box, read about an easy way to make those shares permanently mount.<p>It …

PPEE (Puppy) - Professional PE file Explorer for reversers and malware researchers

July 04, 2017 malware analysis, security tool<p>There are lots of tools out there for statically analyzing malicious binaries, but they are ordinary …

Top Free Disposable Temporary Email Address Providers

As you know an email is very important because if you visit a forum, blog site or buy anything from online you must need an email. But one think is …

Operating Systems

Hacking Tools

<b>winAUTOPWN v3.0 Released – System vulnerability exploitation framework</b><p>WINAUTOPWN ACTIVE SYSTEMS TRANSGRESSOR GUI [ C4 – WAST ] is a Systems and …

CIA Document Confirms Reality Of Superhuman Abilities

Whether it is the childhood stories, the youth fantasies or the folklores you have heard of by the years, there is always that mystical creature with …

Swissnet – The swiss army knife of net utilities and penetration testing.

<b>Swissnet</b> is the swiss army knife of net utilities and penetration testing. By malforming packets, or poisoning caches, you too can gain complete …

Forensics

Pass The Hash Attack Tutorial

<b>Pass The Hash is the attack of the industry! It works anywhere where credentials are not managed properly. Attacks can occur both on local and domain</b> …