• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Month: 28.12.2019

Counter-Forensics. Protecting your smartphone against the Five Eyes
Mobile

Counter-Forensics. Protecting your smartphone against the Five Eyes

28.12.201907/03/2020Editorial5890
The Editorial Board decided to publish this material after reviewing a large number of articles in various periodicals, including technical ones. All these publications, with no exceptions, repeat the same trivial recommendations: "use a complex screen lock…
CONTINUE READING 🡒
Ghidra vs. IDA Pro. Strengths and weaknesses of NSA’s free reverse engineering toolkit
Security

Ghidra vs. IDA Pro. Strengths and weaknesses of NSA’s free…

28.12.201907/03/2020Nik Zerof4730
In March 2019, the National Security Agency of the US Department of Defense (NSA) has published Ghidra, a free reverse engineering toolkit. A couple of years ago, I had read about it on WikiLeaks and was eager…
CONTINUE READING 🡒
FUCK 2FA! Bypassing two-factor authentication with Modlishka
Security

FUCK 2FA! Bypassing two-factor authentication with Modlishka

28.12.201909/10/20258bit4991
Underground forums are full of offers to hack an account or two (or sell you the login credentials of some ten million accounts if you like). In most cases, such attacks involve social engineering and use fake…
CONTINUE READING 🡒
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com