Essential Linux Commands for Hackers: 10 Practical Tips

Essential Linux Commands for Hackers: 10 Practical Tips

During penetration testing, the Linux command line is like a Swiss Army knife: compact yet powerful. Today, we will discuss ten particularly useful Linux commands that can make a hacker’s work more efficient and open the eyes of network security enthusiasts. Explore System Information: uname -a Want to know about your target machine? uname -a … Read more

Essential Linux Server Scripts

Essential Linux Server Scripts

Follow+Star Public Account Number, don’t miss exciting content System Settings Common Mirror Sources Mirror site addresses Official list provided: https://www.debian.org/mirror/list Some domestic ones: ftp.cn.debian.org mirror.bjtu.edu.cn mirror.lzu.edu.cn mirror.nju.edu.cn mirrors.163.com mirrors.bfsu.edu.cn mirrors.hit.edu.cn mirrors.huaweicloud.com mirror.sjtu.edu.cn mirrors.tuna.tsinghua.edu.cn mirrors.ustc.edu.cn Usage: (generally similar) Tsinghua Source –mirror 'https://mirrors.ustc.edu.cn/debian/' Tencent Source –mirror 'https://mirrors.aliyun.com/debian/' Aliyun Source –mirror 'https://mirrors.aliyun.com/debian/' Huawei Source –mirror 'https://mirrors.huaweicloud.com/debian/' SWAP & … Read more

BlueBunny: Command Control C2 Framework Based on BLE

BlueBunny: Command Control C2 Framework Based on BLE

About BlueBunny BlueBunny is a powerful command control framework that enables data communication based on Low Energy Bluetooth, allowing researchers to send control commands directly to the Bash Bunny via Bluetooth. What is Bash Bunny Bash Bunny is a multifunctional USB attack tool similar to USB Rubber Ducky (claimed to be the world’s most advanced … Read more

7 Open Source Guides to Keep Your Brain Busy This Summer

7 Open Source Guides to Keep Your Brain Busy This Summer

Introduction: Download one of our free guides: Develop a Python-based video game; use open source tools to keep your life organized; complete home automation projects; or try your Raspberry Pi home lab. The article contains: 1791 words, reading time approximately: 3 minutes https://linux.cn/article-13575-1.htmlAuthor: Seth KenlonTranslator: zEpoch (LCTT Translation Note: The free e-books from opensource.com require … Read more

Transform Your Raspberry Pi into a Penetration Testing Tool

Transform Your Raspberry Pi into a Penetration Testing Tool

*This article is written by: Meow God 2017, and it belongs to the FreeBuf original reward program. Reproduction without permission is prohibited. Preparation and Introduction Once, a friend of mine said he wanted to buy the hak5 Bash Bunny, a network hijacking keyboard injection all-in-one BadUSB. It looked great, but unfortunately, my friend said he … Read more