Cybersecurity
How Psychic-CCTV Became a Game-Changer for CCTV Pentesting
CCTV video analysis tool built completely in python.
Medical Doctor by trade, but also a software developer. Linux Avid user. I write primary; open-source medical apps, dev tools and libraries I use, and off-topic like horse riding.
Cybersecurity
CCTV video analysis tool built completely in python.
Open-source
If you're a Linux user looking to fine-tune your webcam settings, Cameractrls is a must-have tool. This open-source command-line with GUI suppory utility allows you to control camera properties like brightness, contrast, sharpness, and more with ease. Perfect for video streamers, remote workers, or anyone who needs detailed
CMS
Is Joomla CMS Dead? A Reflection on Its History, Success, and Struggles in 2024 Joomla CMS launched in 2005, quickly becoming one of the most popular open-source content management systems. Known for its flexibility and user-friendliness, it powered millions of websites. Joomla won multiple awards and attracted developers for its
Vulnerability Scanner
Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities It is written in Python and uses some Perl, Ruby and PHP scripts. It includes a variety
Cybersecurity
A port scanner is a network tool used to identify open or accessible ports on a device, server, or network. It sends requests to a target’s various ports and analyzes the responses to determine which ports are open and what services are running on them. Port scanning is crucial
News
In recent months, the Internet Archive, a vital digital library and cultural preservation tool, has come under attack on two fronts: increased hacking attempts and legal challenges. As a cornerstone of the web’s history, the Internet Archive’s "Wayback Machine" holds over 25 years of web pages,
devops
A server hosting control panel is an interface that simplifies managing web servers and hosting environments. Whether you're managing websites, databases, email accounts, or file systems, a control panel provides a centralized platform to streamline these tasks. Instead of dealing with the complexities of command-line interfaces or multiple
Cybersecurity
Pentesters, security researchers, and business owners must ensure the security of their Wi-Fi networks to protect sensitive data and prevent unauthorized access. Testing your network helps identify vulnerabilities that could be exploited by attackers, ensuring your system remains secure. The Importance of Regular Wi-Fi and Network Security Testing for Business
horse riding
In the large city of Mevlana’s Konya, in the middle of Turkey, a disturbing trend has emerged within the horse riding community. What should be a noble pursuit characterized by the bond between rider and horse has instead become tainted by exploitation, misinformation, and unethical practices. This exposé aims
horse riding
As an avid equestrian with few years of experience in Turkey, I’ve witnessed a disturbing trend in the world of horseback riding and horse care. What was once a noble pursuit, built on the foundation of mutual respect between human and horse, has in some cases devolved into a
Vulnerability Scanner
HackingTool is one of the most popular pentesting and hacking toolkits available, widely used by hackers, pentesters, and security experts. It offers a vast range of essential tools, all bundled into one accessible interface. HackingTool is popular among security experts due to its all-in-one design, streamlining the entire pentesting process
network
NetRadar, developed by XDeadHackerX, is a powerful network discovery tool designed to make network reconnaissance and monitoring effortless. It provides a simple yet effective solution for identifying devices on a local network and gathering key information about them. NetRadar is a great tool for anyone who wants a reliable and
gadgets
Ah, the Smart Jump Rope. Just when you thought we were running out of things to slap a Bluetooth chip on, someone went and said, “You know what really needs a processor? A rope. But not just any rope—a jump rope!” Because, apparently, regular jumping just isn’t intelligent
gadgets
Why simply exercise when you can have a smart gadget do all the thinking for you? Forget about mastering form, technique, or self-discipline—these gadgets are here to help (or completely confuse you). Let’s take a look at the most pointless smart sports devices you can find on Amazon,
Artificial Intelligence (AI)
As a web developer, I've been on the front lines of integrating generative AI into various applications, including medical EMR/EHR and ERP systems. While there's a buzz around AI, driven by trends and competition, I've come to question whether this trend truly benefits
Opinions
Welcome to the era of smart devices, where “getting off the couch” is a legendary tale told by our ancestors. With AI apps and gadgets invading every corner of our lives, it seems we’ve turned into a bunch of highly advanced couch potatoes—more tech-savvy and less physically active
Password Manager
A password manager is essential for securely storing and managing passwords, payment information, notes, and personal identities. Passy is a cross-platform password manager that prioritizes your privacy and security by allowing you to store sensitive information offline while synchronizing it across all your devices. However, as it works on many
Android
Yaralyze is an malware detection tool for Android that relies on two types of static analysis, Yara rule analysis and hashes analysis.
Android
In today's digital landscape, securing your Android device is more important than ever. With reports revealing that 11 million devices have been infected with malicious bots , ensuring the safety of your smartphone is a priority. If you're concerned about the security of your Android device, look
GDPR
In recent years, many companies outside the EU, including Turkey, have been hit with significant fines for failing to comply with GDPR regulations. The GDPR doesn’t just apply to EU-based businesses but extends to any company that processes the personal data of EU citizens. This creates challenges for many
Arch Linux
Bluepot is free and open-source Bluetooth honeypot framework designed for security research and penetration testing. It creates multiple virtual Bluetooth devices, simulating vulnerable endpoints to attract attackers. Pentesters and security researchers can use Bluepot to study and analyze Bluetooth-based attacks in a controlled environment, making it a valuable tool for
pentesting
Wifiphisher is an advanced Wi-Fi security tool that automates phishing attacks against Wi-Fi networks to obtain credentials or infect devices with malware. It works by performing man-in-the-middle attacks by creating rogue access points, allowing attackers to capture credentials or deploy malware without needing brute-force methods. Wifiphisher is highly customizable and
Cybersecurity
Pixiewps is an open-source tool written in C designed to perform offline brute-force attacks on WPS (Wi-Fi Protected Setup) PINs by exploiting vulnerabilities in some software implementations. It specifically leverages the "pixie-dust attack," a method discovered by Dominique Bongard in 2014. This attack takes advantage of weak or
Cybersecurity
wifipumpkin3 is powerful framework for rogue access point attack, written in Python, that allow and offer to security researchers, red teamers and reverse engineers to mount a wireless network to conduct a man-in-the-middle attack. Features * Rogue access point attack * Man-in-the-middle attack * Module for deauthentication attack * Module for extra-captiveflask templates * Rogue