• LOGIN
    • No products in the cart.

All posts by Anna Kondzierska

18

May'17

Dagon- advanced hash cracking and manipulation system

Named after the prince of Hell, Dagon (day-gone) is a advanced hash cracking and manipulation system, capable of bruteforcing multiple hash types, …

Read More

11

Apr'17

The Holy Book of x86

“Are you such a dreamer to put the world to rights? I stay home forever where 2 and 2 always …

Read More

11

Apr'17

8 Ways to Hone Your Programming Skills and Become a Better Coder – Infographic by AppDynamics

As with everything related to technology, programming has gotten infinitely more complex—and faster. Every day, it seems, there are new …

Read More

13

Mar'17

My catch of 4 months in the Amazon IP address space- article by Remco Verhoef

The cloud is bringing a lot of interesting opportunities, enabling you to scale your server farm up and down depending …

Read More

02

Mar'17

Functional programming languages entering the mainstream- infographic by Appdynamics

Functional programming languages such as Scala, Clojure, and Haskell are quietly growing in popularity. These languages offer expressive and concise …

Read More

03

Oct'16

Resources and tools that will help you in your day to day activities by Vignesh

This is my first article in an international arena. Basically, from my web application testing background, I will share a …

Read More

21

Sep'16

Brakeman, a static analysis tool- interview with Justin Collins, creator of the tool

Dear Readers, today we present you an interview with Justin Collins who is the creator of Brakeman tool- a static analysis tool. He …

Read More

22

Aug'16

Bug Bounty Programs & mobile pentesting: Apple vs. Android

With so many data breaches and hackers breaking into systems, companies constantly scan and improve their code, to make it …

Read More

19

Aug'16

Exploiting blind SQL injections in ‘UPDATE’ and ‘INSERT’ statements without stacked queries by Sina Yazdanmehr

Overview The SQL injection attack was introduced around 1998 for the first time. This high-level risk vulnerability can be found …

Read More

04

Jul'16

How to prepare and use Docker for web pentest by Júnior Carreiro

Introduction Docker is the world’s leading software containerization platform. Using Docker we can create different environments for each Pentest type. …

Read More

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013