Privilege escalation: Offline password cracking applications.
BackBox 3 Apps

Privilege escalation: Online password cracking applications.
BackBox 3 Apps

Privilege escalation: Sniffing applications.
BackBox 3 Apps

Privilege escalation: Spoofing applications.
BackBox 3 Apps

Maintaining Access: Tunneling applications.
BackBox 3 Apps

Maintaining Access: Web backdoor applications.
BackBox 3 Apps

Related Post:  Netrunner Rolling 2014.09 review

Reverse Engineering Applications.
BackBox 3 Apps

Social Engineering: Honeypots applications.
BackBox 3 Apps

Forensic Analysis: Acquisition applications.
BackBox 3 Apps

Forensic Analysis: Data recovery applications.
BackBox 3 Apps

Forensic Analysis: File analysis applications.
BackBox 3 Apps

Wireless Analysis: Wireless cracking (aircracking-ng) applications.
BackBox 3 Apps

Related Post:  Linux Mint 10 KDE review

Wireless Analysis: Wireless scanning applications.
BackBox 3 Apps

Miscellaneous: Stress-testing applications.
BackBox 3 Apps

Miscellaneous: Wiping applications.
BackBox 3 Apps

Resources: You may download a 32- or 64-bit installation of BackBox 3 from here.

Share:

Share on facebook
Facebook
Share on twitter
Twitter
Share on pinterest
Pinterest
Share on linkedin
LinkedIn

Hola! Did you notice that LinuxBSDos.com no longer runs network ads?  Yep, no more ads from the usual suspects that track you across the Internet.  But since  I still need to pay to keep the site running, feel free to make a small donation by PayPal.

Subscribe for updates. Trust me, no spam!

Mailchimp Signup Form

Sponsored links

1. Attend Algorithm Conference, a top AI and ML event for 2020.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.

2 Responses

Leave a Reply to Divtech Cancel reply

Your email address will not be published. Required fields are marked *

Get the latest

On social media
Via my newsletter
Mailchimp Signup Form

Sponsored links

1. Attend Algorithm Conference, a top AI and ML event for 2020.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.
Hacking, pentesting distributions

Linux Distributions for Hacking

Experts use these Linux distributions for hacking, digital forensics, and pentesting.

Categories
Archives

The authors of these books are confirmed to speak during

Algorithm Conference

T-minus AI

Author was the first chairperson of AI for the U.S. Air Force.

The case for killer robots

Author is the Director of the Center for Natural and Artificial Intelligence.

Why greatness cannot be planned

Author works on AI safety as a Senior Research Scientist at Uber AI Labs.

Anastasia Marchenkova

An invitation from Anastasia Marchenkova

Hya, after stints as a quantum researcher at Georgia Tech Quantum Optics & Quantum Telecom Lab, and the University of Maryland Joint Quantum Institute, I’m now working on superconducting qubit quantum processors at Bleximo. I’ll be speaking during Algorithm Conference in Austin, Texas, July 16 – 18, 2020. Meet me there and let’s chat about progress and hype in quantum computing.