TorProxy TorProxy is kernel module which routes all network traffic through the Tor anonymity network. The module uses Netfilter hooks in the Linux kernel to filter/NAT packets and ensure all...
Install Metasploit Framework on any Android devices Requirement: Termux Android 5.0 or later Internet connection How to Open Termux, type command $ apt update $ apt upgrade Install wget $ apt install wget...
In this article, we will introduce some simple methods and techniques to help you clean up the Ubuntu/Linux Mint systems and get more free space. Remove the packages that are no...
U2F Zero U2F Zero is an open source U2F token for 2-factor authentication. It is implemented securely. It works with Google accounts, Github, Duo, and anything else supporting U2F. The...
Install DVWA on Kali Linux 2017.2 Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goals are to be an aid for security...
MinerBlock A web extension to block web-based cryptocurrency miners all over the web. Available on Chrome Store Source: https://github.com/xd4rker/MinerBlock
Google Authenticator OpenSource The Google Authenticator project includes implementations of one-time passcode generators for several mobile platforms. One-time passcodes are generated using open standards developed by the Initiative for Open Authentication...
Exe2Image A simple utility to convert EXE files to PNG images and vice versa. Download: https://github.com/OsandaMalith/Exe2Image/releases Screenshots Putty.exe converted to an image. Source: https://github.com/OsandaMalith/Exe2Image
WOPR – Windows Operations, Pentest, and Response A Windows build system to convert Windows into a capable Information Security Operations Platform Tool List clink virtualbox VirtualBox.ExtensionPack win32-openssh wireshark nmap zap...
gtop System monitoring dashboard for terminal. Requirements Linux / OSX / Windows (partial support) Node.js >= v4 Installation Usage Usage You can sort the process table by pressing p: Process...
Wireshark is used for network analysis and troubleshooting by allowing users to capture network traffic and view packets. The view of the information can be customized using a display filter....
To improve the situation with the Security Server, a good idea is to install security updates automatically. In order to ensure that security updates are posted automatically, you need an unattended-upgrades package. unattended-upgrades...
OpenVPN Access Server is a full-featured secure network tunneling VPN software solution that integrates OpenVPN server capabilities, enterprise management capabilities, simplified OpenVPN Connect UI, and OpenVPN Client software packages that...
Everyone is worried that their computer is infected, identity theft or online account hacker invasion. Then you can take simple steps to greatly reduce the likelihood of occurrence of these bad...