Anastasis KingStyle

Anastasis KingStyle

94 followers
·
53 followers
Thessaloniki, Greece  ·  PC Technical,Cyber Security Expert,Cyber Security Analyst,Information Security Researcher,Part-Time Hacker,Child Pornography & Sexual Abuse Combat.
Anastasis KingStyle
More ideas from Anastasis
Web Application Penetration Testing Checklist

Web Application Penetration Testing Checklist

Epic Games Fortnite for Android–APK Downloads Leads to Malware

Epic Games Fortnite for Android–APK Downloads Leads to Malware

Advanced Techniques for Maximum Exploitation

Advanced Techniques for Maximum Exploitation

UncoverDCShadow: dynamically uncover a DCShadow attack

UncoverDCShadow: dynamically uncover a DCShadow attack

How to Break into Somebody's Computer Without a Password (Exploiting the System)

How to Break into Somebody's Computer Without a Password (Exploiting the System)

Liberty Financial Services Confirms It Has Been Hacked

Liberty Financial Services Confirms It Has Been Hacked

VOOKI - Web Application Vulnerability Scanner

VOOKI - Web Application Vulnerability Scanner

Configure Port Forwarding to Create Internet-Connected Services

Configure Port Forwarding to Create Internet-Connected Services

Android MysteryBot Banking Malware Is Worse Than LokiBot

Android MysteryBot Banking Malware Is Worse Than LokiBot

StaCoAn v0.80 release: static code analysis on mobile applications for developers, bugbounty hunters and ethical hackers

StaCoAn v0.80 release: static code analysis on mobile applications for developers, bugbounty hunters and ethical hackers

Apple USB Restricted Mode feature will make hard for law enforcement to crack devices

Apple USB Restricted Mode feature will make hard for law enforcement to crack devices

ClipboardWalletHijacker Malware Campaign Infects 300,000 Computers

ClipboardWalletHijacker Malware Campaign Infects 300,000 Computers

mimikatz 2.1.0 20180616 release: tool to play with Windows security

mimikatz 2.1.0 20180616 release: tool to play with Windows security

how2heap: learning various heap exploitation techniques

how2heap: learning various heap exploitation techniques

recon.sh: toolset to track & organize output of reconnaissance tools

recon.sh: toolset to track & organize output of reconnaissance tools