@anon
sign up
@anon
sign up
pull down to refresh
Bjorn: powerful network scanning security tool for the Raspberry Pi
github.com/infinition/Bjorn
112 sats
\
0 comments
\
@Rsync25
11 Nov 2024
tech
related
ISP IPs Targeted in Brute-Force Attacks to Deploy Info Stealers and Cryptominers
thehackernews.com/2025/03/over-4000-isp-networks-targeted-in.html?m=1
40 sats
\
0 comments
\
@ch0k1
6 Mar
security
Portmaster 1.0 – Open-Source Network Monitor and Privacy Firewall
safing.io/blog/2022/10/27/portmaster-reaches-1.0/
632 sats
\
4 comments
\
@dhaavi
27 Oct 2022
bitcoin
freebie
The curious case of the Raspberry Pi in the network closet (2019)
blog.haschek.at/2019/the-curious-case-of-the-RasPi-in-our-network.html
32 sats
\
1 comment
\
@hn
8 Jan 2024
tech
TorBox — an easy to use, anonymizing router based on Raspberry Pi
github.com/radio24/TorBox
5633 sats
\
3 comments
\
@astronaut
17 Mar 2023
bitcoin
Meet Radio Silence, a Network monitor and firewall for Mac
radiosilenceapp.com
1394 sats
\
5 comments
\
@nullama
19 Mar 2024
tech
KVRT for Linux: malware scanner for Linux systems
www.kaspersky.com/blog/kvrt-for-linux/51375/
75 sats
\
2 comments
\
@Gian
2 Jun 2024
security
Little Snitch: Network Monitor and Application Firewall for macOS
www.obdev.at/en/products/littlesnitch/index.html
31 sats
\
1 comment
\
@hn
30 Dec 2024
tech
RustScan: The Modern Port Scanner
github.com/RustScan/RustScan
52 sats
\
2 comments
\
@Rsync25
15 Sep 2024
tech
Vulnhuntr: Open-source tool to identify remotely exploitable vulnerabilities
www.helpnetsecurity.com/2025/07/28/vulnhuntr-open-source-tool-identify-remotely-exploitable-vulnerabilities/
110 sats
\
0 comments
\
@ch0k1
28 Jul
security
Millions of Internet Hosts Vulnerable to Attacks Due to Tunneling Protocol Flaws
www.securityweek.com/millions-of-internet-hosts-vulnerable-to-attacks-due-to-tunneling-protocol-flaws/
35 sats
\
0 comments
\
@ch0k1
19 Jan
security
VNC Is The Hacker’s New Remote Desktop Tool For Cyber Attacks
gbhackers.com/vnc-cyber-attacks-remote-desktop-security/
20 sats
\
0 comments
\
@ch0k1
4 May 2024
security
35 Top Cybersecurity Tools
110 sats
\
1 comment
\
@Azik
4 Apr 2024
Linux
35 Top Cybersecurity Tools
278 sats
\
0 comments
\
@Rsync25
16 Jun 2024
security
Linux Kernel Vulnerability Let Attackers Escalate Privilege - PoC Released
cybersecuritynews.com/linux-kernel-vulnerability-escalate-privilege/
36 sats
\
0 comments
\
@ch0k1
23 Apr
security
Hackers Attacking Linux SSH Servers to Deploy Scanner Malware
gbhackers.com/hackers-attacking-linux-ssh-servers/
628 sats
\
1 comment
\
@nivek
27 Dec 2023
tech
Palo Alto Firewalls Found Vulnerable to Secure Boot Bypass and Firmware Exploits
thehackernews.com/2025/01/palo-alto-firewalls-found-vulnerable-to.html
21 sats
\
0 comments
\
@ch0k1
25 Jan
security
Ethernet For Hackers: The Very Basics
hackaday.com/2024/02/12/ethernet-for-hackers-the-very-basics/
156 sats
\
0 comments
\
@shadowymartian
20 Feb 2024
devs
Linux devices are under attack by a never-before-seen worm
arstechnica.com/security/2024/01/a-previously-unknown-worm-has-been-stealthily-targeting-linux-devices-for-a-year/
257 sats
\
0 comments
\
@beorange
10 Jan 2024
tech
AI-powered Pentesting Tool 'Villager' Combines Kali Linux Tools with DeepSeek
cybersecuritynews.com/villager-ai-powered-pentesting-tool/
100 sats
\
0 comments
\
@ch0k1
13 Sep
security
Hackers Weaponized Free SSH Client Putty to Attack Windows Systems With Malware
cybersecuritynews.com/hackers-weaponized-free-ssh-client-putty/amp/?fbclid=IwY2xjawKrqwRleHRuA2FlbQIxMQABHuPfAQ66mFpQTzghr6hIz0bZuSYaJyTRMMMm2aqPFEO9FqeksaFDgc5nyQtx_aem_wguTlX9JbsTX_InCWyJuMw
10 sats
\
0 comments
\
@ch0k1
3 Jun
news
PiFex: JTAG Hacking with a Raspberry Pi
voidstarsec.com/blog/jtag-pifex
10 sats
\
0 comments
\
@hn
6 May 2024
tech
more