Anastasis KingStyle

Anastasis KingStyle

www.prodefence.org
Thessaloniki, Greece / PC Technical,Cyber Security Expert,Cyber Security Analyst,Information Security Researcher,Part-Time Hacker,Child Pornography & Sexual Abuse Combat.
Anastasis KingStyle
More ideas from Anastasis
roxysploit - Penetration Testing Suite

roxysploit - Penetration Testing Suite

BLEAH - A BLE Scanner For "Smart" Devices Hacking

BLEAH - A BLE Scanner For "Smart" Devices Hacking

Kali Linux 2018.1 Release - The Best Penetration Testing Distribution

Leading source of Security Tools, Hacking Tools, CyberSecurity and Network Security ☣

Grouper - A PowerShell script for helping to find vulnerable settings in AD Group Policy

Grouper - A PowerShell script for helping to find vulnerable settings in AD Group Policy

DVWA - Damn Vulnerable Web Application

DVWA - Damn Vulnerable Web Application

IDAsec - IDA plugin for reverse-engineering and dynamic interactions with the Binsec platform

IDAsec - IDA plugin for reverse-engineering and dynamic interactions with the Binsec platform

Beginner Guide to IPtables

Beginner Guide to IPtables

Minesweeper - A Burpsuite plugin (BApp) to aid in the detection of cryptocurrency mining domains (cryptojacking)

Minesweeper - A Burpsuite plugin (BApp) to aid in the detection of cryptocurrency mining domains (cryptojacking)

Engagement Tools Tutorial in Burp suite

Engagement Tools Tutorial in Burp suite

Hack the C0m80 VM (Boot2root Challenge)

Hack the C0m80 VM (Boot2root Challenge)

Payload Processing Rule in Burp suite (Part 1)

Payload Processing Rule in Burp suite (Part 1)

Hack the Bsides London VM 2017(Boot2Root)

Hack the Bsides London VM 2017(Boot2Root)

Digital Forensics Investigation through OS Forensics (Part 3)

Digital Forensics Investigation through OS Forensics (Part 3)

Convert Virtual Machine to Raw Images for Forensics (Qemu-Img)

Convert Virtual Machine to Raw Images for Forensics (Qemu-Img)

Post Exploitation Using WMIC (System Command)

Post Exploitation Using WMIC (System Command)

PrivCount – Privacy-preserving Tor statistics aggregation tool

PrivCount – Privacy-preserving Tor statistics aggregation tool