Author: Alex


Comprehensive Guide to John the Ripper. Part 5: rule-based attack

How to mount disk images for viewing and editing files (SOLVED)

Programs for extracting information from the Windows registry

How to open disks of virtual machines and download and upload files to them (SOLVED)

Practical examples of Hashcat usage

Examples of using HTTP headers for “hidden” data transfer

How to hack HTTP Basic and Digest Authentication

How to use User Agent to attack websites

How to install Kali Linux on a flash drive or external drive as a full-fledged OS