unix-ninja
  • Home
  • Subscribe
  • Search

Security

A cheat-sheet for password crackers
A Foundation for Buffer Overflow Attacks
A guide to password cracking with Hashcat
Anonymizing network access with random MAC addresses
Attacking Google Authenticator
Building a Password Cracking Rig for Hashcat
Building a Password Cracking Rig for Hashcat - Part II
Building a Password Cracking Rig for Hashcat - Part III
Checking open ports across a network
Cracking passwords to protect LDAP
Creating RSA public keys from private keys
Creating SSL Certificates
Disabling SSH host key checking
Enterprise Security in an Operations World
Experimenting with Ashley Madison
Exploiting masks in Hashcat for fun and profit
Exploiting Vim with CVE-2019-12735
Firefox 31+ and sec_error_ca_cert_invalid
GPG Quick Start
Hashcat Line Length Exceptions
Interviews: Choose your own adventure-style
Introducing Redteam Notebook! (Alpha)
Introducing Shellfire!
Password DNA
Patching MyBB to use Bcrypt
Playing with PANs to improve security
PostgreSQL for red teams
Protecting your infrastructure with Google Authenticator as 2FA
Securing Sendmail with access.db
Securing your private data with the Enterprise Cryptographic Filesystem
Shellfire: From OCR to RCE
Some thoughts on GoDaddy's security program
SSH Error: Host key verification failed.
The Art of Creating Good Passwords
The dangers of prepending $PATH
World Password Day 2021
Your xkcd passwords are pwned

Copyright © 2025. All Rights Reserved.