Whether you wish to be a hacker who is interested in hacking wireless network, web app, database; cracking password, software....; or want to engage in cyber security related works in the future, Offensive Security's Kali Linux (a penetration testing OS) should be always your main "battlefield" and "experimental field".
In this post, AppNee will continue to release all kinds of popular, long-tested password dictionaries with very high quality. All of them are proven by users from all over the world, so that any dictionary generated by tools can not be comparable to them. Moreover, they cover all application scopes, fields and uses (we will make the corresponding identification).
Two core developers of dSploit went separate ways in the fall of 2014. dSploit's father merged it into the commercial zANTI 2 with ambition to build a series of security apps on Android platform. Meanwhile, the other founder (now cSploit's father) can't wait the distant promise to open source of zANTI 2. Thus, he decided to fork the killed project and finish all the original dSploit To-Dos on a new core - cSploit, by himself.
With the development of mobile devices and network, intelligent mobile phone has become a new paradise for hackers. Imagine, under this environment of everybody holds a smart phone nowadays, nothing is more active than the mobile phone viruses and the vulnerabilities' exploits of software and mobile network. Therefore, to understand and master some practical security tools seems necessary and meaningful.
First, AppNee warns everybody, except the technology itself, DroidJack is inadvisable, even despicable. If it were not for fun or study, please stay away from any apps in this type. They are not only immoral but also dangerous, for the people around you and yourself!
The Web Application Hacker's Handbook (WAHH for short), 2nd Edition is one of bible-level of security technology books with comprehensive, abundant and professional content highly recommended by AppNee. This second edition new added about 30% of content, mainly introduced new trends and a large number of new vulnerabilities in the field of Web security.
Modifying the data in memory can be not only used to decode/hack software, also used to hack all kinds of games (especially PC games and emulator based video games). Cheat Engine (CE for short) can make one game easier or more difficult, in other words, that's to be more suitable for you (but not necessarily to be more interesting)! Its principle is - the memory debugging/hacking.