||This article is the original content of AppNee. All rights reserved. To repost or reproduce, please make a footnote with our article link!
Whether you wish to be a hacker who is interested in hacking wireless network, web app, database; cracking password, software….; or want to engage in cyber security related works in the future, Offensive Security‘s Kali Linux (a penetration testing OS) should be always your main “battlefield” and “experimental field”.
Continue reading Kali Linux 101 Video Training Courses in one package
In this post, AppNee will continue to release all kinds of popular, long-tested password dictionaries with very high quality. All of them are proven by users from all over the world, so that any dictionary generated by tools can not be comparable to them. Moreover, they cover all application scopes, fields and uses (we will make the corresponding identification).
Continue reading [01.14] All Password List, Dictionary collection for various purposes
Two core developers of dSploit went separate ways in the fall of 2014. dSploit’s father merged it into the commercial zANTI 2 with ambition to build a series of security apps on Android platform. Meanwhile, the other founder (now cSploit‘s father) can’t wait the distant promise to open source of zANTI 2. Thus, he decided to fork the killed project and finish all the original dSploit To-Dos on a new core – cSploit, by himself.
Continue reading cSploit – Successor of dSploit, most powerful network penetration testing toolkit
With the development of mobile devices and network, intelligent mobile phone has become a new paradise for hackers. Imagine, under this environment of everybody holds a smart phone nowadays, nothing is more active than the mobile phone viruses and the vulnerabilities’ exploits of software and mobile network. Therefore, to understand and master some practical security tools seems necessary and meaningful.
Continue reading [v1.1.3c] dSploit – Most popular penetration testing suite for Android
First, AppNee warns everybody, except the technology itself, DroidJack is inadvisable, even despicable. If it were not for fun or study, please stay away from any apps in this type. They are not only immoral but also dangerous, for the people around you and yourself!
Continue reading [v4.4] DroidJack – Powerful and dangerous remote controller for Android
The Web Application Hacker’s Handbook (WAHH for short), 2nd Edition is one of bible-level of security technology books with comprehensive, abundant and professional content highly recommended by AppNee. This second edition new added about 30% of content, mainly introduced new trends and a large number of new vulnerabilities in the field of Web security.
Continue reading The Web Application Hacker’s Handbook, 2nd Edition HD PDF
Modifying the data in memory can be not only used to decode/hack software, also used to hack all kinds of games (especially PC games and emulator based video games). Cheat Engine (CE for short) can make one game easier or more difficult, in other words, that’s to be more suitable for you (but not necessarily to be more interesting)! Its principle is – the memory debugging/hacking.
Continue reading Cheat Engine – Very excellent and popular PC/Flash/Video games modifier