Showing posts with label Pentest. Show all posts
Showing posts with label Pentest. Show all posts

How to make a fronting from AWS to another hosting

Broadly speaking, we can say that the  fronting  technique  consists of obfuscating the data source of a site.  This is something that ...

How to remove the Ransomware and recover your files.

For several days, many people had been contacting me to ask me about how to recover the files infected by the Ransomware, so I decided ...

how to exploit libssh vulnerable flaw

LIBSSH BACKGROUND Computers everywhere the globe believe the libssh library. The issue with this is often the discharge of bug CVE-2018...

Linux Suggester Exploit for root server

This program run without arguments will perform a 'uname -r' to grab the Linux Operating Systems release version, and return a s...