Today, cars are more electronized than ever before. The “This Car Runs on Code” report published in the IEEE Spectrum journal indicated: As of 2009, a typical car already contains 100+ processors, 50+ electronic control units, 5000+ meters of cabling and 100 millions of lines of code. That means, along with the more and more close integration between computer systems and vehicles, the security audit is also becoming increasingly important and complicated.
Continue reading The Car Hacker’s Handbook HD PDF
Whether you wish to be a hacker who is interested in hacking wireless network, web app, database; cracking password, software….; or want to engage in cyber security related works in the future, Offensive Security‘s Kali Linux (a penetration testing OS) should be always your main “battlefield” and “experimental field”.
Continue reading Kali Linux 101 Video Training Courses in one package
Two core developers of dSploit went separate ways in the fall of 2014. dSploit’s father merged it into the commercial zANTI 2 with ambition to build a series of security apps on Android platform. Meanwhile, the other founder (now cSploit‘s father) can’t wait the distant promise to open source of zANTI 2. Thus, he decided to fork the killed project and finish all the original dSploit To-Dos on a new core – cSploit, by himself.
Continue reading cSploit – Successor of dSploit, most powerful network penetration testing toolkit
With the development of mobile devices and network, intelligent mobile phone has become a new paradise for hackers. Imagine, under this environment of everybody holds a smart phone nowadays, nothing is more active than the mobile phone viruses and the vulnerabilities’ exploits of software and mobile network. Therefore, to understand and master some practical security tools seems necessary and meaningful.
Continue reading [v1.1.3c] dSploit – Most popular penetration testing suite for Android
There are always a lot of tech news sites falsely beautify Network Spoofer and zANTI such as these tools as “one of the Android penetration testing apps”. AppNee would say they were only born for hacking Wi-Fi network from an Android phone – some guys only use it for fun; but some others for illegal business deals.
Continue reading [v2.4.0] Network Spoofer – Change websites on others’ computer via Wi-Fi
Cyborg Linux (AKA: Cyborg Hawk) is a Ubuntu (currently the most popular Unix-like OS) based penetration testing Linux distro, specially designed for hackers or cyber security experts to perform all kinds of network security penetration testing, assessment, computer forensics and more.
Continue reading Cyborg Linux – More advanced, beautiful and poweful than Kali Linux
We are very glad to tell you: from now no we have a better choice – Xiaopan OS (relative to the combination of CDlinux + minidwep) for cracking the wireless network WEP (Wired Equivalent Privacy) /WPS (Wi-Fi Protected Setup)/WPA (Wi-Fi Protected Access)/WPA2 encrypted passwords.
Continue reading [v6.4.1] Xiaopan OS – Better than CDLinux + Minidwep