In taking Vivek Ramachandran’s course x86/64 Assembly and Sellcoding on Linux  I ran into a slight problem.  When we get to […]
*Note: This post is for education purposes only.* I’m always eager to learn new things.  I came across a really […]
A network admin friend of mine told me about a quick and easy ISO that can be set up for […]
Make sure you know the legalities of enumerating DNS for subdomain resolution – This is considered brute force and it […]
As this is considered an Active and not Passive Scan, be sure you either own the hardware you are port […]
Overview This walk-through will make use of Python and Wireshark to sniff data packets out of a commercial product with […]
I played with my Python port scanner I wrote awhile back.  Rather then just having the script as it was, I wanted […]
Concept The concept for this came from the book Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and […]
My scripts are hard coded to localhost. If you scan a remote host, make sure you have permission to scan […]
Back in the previous post on making a tool to find MD5 hash values… we were limited to just MD5 hash types. […]

Latest news

Lorem ipsum dolor sit amet, at mei dolore tritani repudiandae. In his nemore temporibus consequuntur, vim ad prima vivendum consetetur.

Many years ago, when I first started with web automation, I used a Ruby web framework called Watir. A lot […]
Recently I came to an issue of needing to wait for an element to load. Selenium does have a WebdriverWait […]
# This sample code uses the Appium python client # pip install Appium-Python-Client # Then you can paste this into […]
Archives
Categories