Search results

  1. Mutt

    Capture and modify TCP / IP traffic on the fly with Trudy

    There are several excellent tools for capturing network traffic. So, Scapy and Wireshark are excellent solutions for organizing passive sniffing, and Scapy, moreover, is capable of sending additional packets. In case you need to intercept traffic in the Man-in-the-Middle position, you can use...
  2. Mutt

    Firefox setup 2021

    In this article, we will continue the topic of the previous article, who have not read it, I advise you to read it. Why Firefox? Anyway, this is the most flexible and user-friendly browser I've tried. In addition, the browser itself is ideal in terms of anonymity. I confess that I didn't get...
  3. Mutt

    The basics of Whonix - based security

    The methods written in this article will help you achieve some peace of mind for your skin. In other words, what you need for a restful sleep at night. The implementation of this miracle will happen with the help of: Virtualbox + Whonix gateway + Windows + vpn. You will need: Iron of medium...
  4. Mutt

    Самый лучший и быстрый способ обнала СС - вбив с карты на карту

    Подтверждение миников Paysend не просит, так как это обычная прокладка по работе с картами, а не платежная система или БА. А я ещё нашёл 2 подобные конторы, с завтрашнего дня начну тестировать и отпишу результат.
  5. Mutt

    Доступ к шопу CC Benumb

    Можешь ли ты спросить у этого селлера бинов, откуда он узнал про шоп? Сам вообще давно им пользуешься, какие впечатления? Этого шопа нет ни на одном форуме, каким образом узнают про него? Сарафанное радио так сильно работает? Если он начнёт кидать, то все стрелки на тебя полезут, так как именно...
  6. Mutt

    TOR VPN router based on Raspberry

    With this device you can connect any pc / smartphones, wrap traffic first in VPN, then in Tor, obfuscate it using obfs-proxy and send it to a remote VPN server. What we need? 1) Any single board computer. In my case, this is a Raspberry Pi model B +. 2) Raspbian OS. 3) Micro SD. 4) Card reader...
  7. Mutt

    [Udemy] Kali Linux for beginners. All parts with translation.

    Description Do you want to learn how to hack systems using Kali Linux, but don't know where to start? Are you intimidated by the command line and you don't know what to do with it? If so, then this course is perfect for you. In this tutorial, you will start from scratch, assuming you don’t know...
  8. Mutt

    Linux with Windows 10 interface

    Today I would like to talk about the Linuxfx 10 distribution, which looks like Windows 10. This distribution is developed in Brazil, and is based on Ubuntu 20.04. So those who plan to switch to Linux from Windows and do not want to get used to the new interface may like Linuxfx 10. The creators...
  9. Mutt

    Доступ к шопу CC Benumb

    Кто тебе дал ссылку на этот шоп? В любом случае где-то должна быть его реклама и проверка. Откуда ты же узнал про него или тебе типа друг скинул инвайт? Ну а друг то откуда узнал? Не обижайтесь если соберет баланс и кинет, как уже делали многие шопы. Вы были предупреждены.
  10. Mutt

    Hiding the smartphone from the all-seeing eyes of corporations

    The content of the article Start Getting ready The first way. We use the drain The second way. Install CyanogenMod We put an alternative market We put microG Bringing up your personal Dropbox Synchronizing contacts and calendar Restricting applications in permissions Tor, untracked browser and...
  11. Mutt

    We kill WiFi neighbor in 5 minutes

    This material is provided for educational purposes only and was created as part of the study of information security. The author did not publish material for malicious purposes. If someone uses the information for personal gain, then the author is not responsible for any harm or damage caused...
  12. Mutt

    Clean up VirtualBox logs

    VirtualBox (Oracle VM VirtualBox) is a virtualization software product for Microsoft Windows, Linux, FreeBSD, macOS, Solaris / OpenSolaris, ReactOS, DOS and others The virtualization system of operating systems VirtualBox retains a strong leadership among ordinary users due to its...
  13. Mutt

    Running programs in an isolated shell

    Let's say you downloaded a pirated program, blindly trusting the "purity" of which is very naive. To check how the program behaves in the system, let's use Sandboxie. Sandboxie is probably the most popular sandbox that allows you to isolate programs running in Windows 10, 8.1 and Windows 7 so...
  14. Mutt

    How hacker quests work and why it's hard to break away from them

    Article from the paid subscription of the "hacker" magazine Curiosity is the key to excellence. A passionate person is willing to make the effort to find answers over and over again and satisfy their craving for knowledge. One way to harness the power of curiosity is through hacking quests...
  15. Mutt

    Complete instructions for all Wi-Fi hacking techniques

    This material is provided for educational purposes only and was created as part of the study of information security. The author did not publish material for malicious purposes. If someone uses the information for personal gain, then the author is not responsible for any harm or damage caused...
  16. Mutt

    Mandatory rules when working with anonymous operating systems

    Good day, friend, now you will learn about the basic rules when working with anonymous operating systems Some overestimate the capabilities of anonymous operating systems, thinking that after they are launched, they have no use for any enemy adversity, but this is extremely destructive to think...
  17. Mutt

    VPN varieties

    The army of VPN users has grown significantly in recent months. And we are not talking about those who like to bypass locks and visit prohibited sites, but about those who use VPN for safe work (yes, remote work). This is a reason to take another look at the arsenal of available protocols and...
  18. Mutt

    Killing WiFi

    This material is provided for educational purposes only and was created as part of the study of information security. The author did not publish material for malicious purposes. If someone uses the information for personal gain, then the author is not responsible for any harm or damage caused...
  19. Mutt

    We hide the virus in a file of ANY format

    This material is provided for educational purposes only and was created as part of the study of information security. The author did not publish material for malicious purposes. If someone uses the information for personal gain, then the author is not responsible for any harm or damage caused...
  20. Mutt

    Hacking devices via QR code

    This material is provided for educational purposes only and was created as part of the study of information security. The author did not publish material for malicious purposes. If someone uses the information for personal gain, then the author is not responsible for any harm or damage caused...
Top