Search titles only
By:
Home
Members
Moderators
Current visitors
Escrow
Deposit
Account Upgrades
ADS
Help
Log in
Register
What's new
Search
Search titles only
By:
Menu
Log in
Register
Members
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Tr0jan_Horse
ULTIMATE
Local
Active Member
Veteran
Joined
Oct 23, 2024
Last seen
Yesterday at 3:47 AM
Messages
303
Reaction score
6
Deposit
0$
Find
Find content
Find all content by Tr0jan_Horse
Find all threads by Tr0jan_Horse
Latest activity
Postings
About
Tr0jan_Horse
posted the thread
Metasploit Basics, Part 16: Metasploit SCADA Hacking
in
Malware | Hacking
.
Metasploit is widely recognized as a powerful tool to conduct penetration testing and hacking on traditional IT systems, but few people...
Jun 30, 2025
Tr0jan_Horse
posted the thread
Metasploit Basics, Part 04: Connecting and Using the postgresql Database with Metasploit
in
Malware | Hacking
.
Welcome back, my aspiring Metasploit Cyber Warriors! In this series, we are exploring the power and features of the world’s most popular...
Jun 30, 2025
Tr0jan_Horse
posted the thread
Metasploit Basics, Part 23: Remote Windows Forensics with Metasploit
in
Malware | Hacking
.
Although Metasploit is an “exploitation framework” primarily used for hacking and penetration testing, it can also be used to provide...
Jun 30, 2025
Tr0jan_Horse
posted the thread
Metasploit Basics, Part 27: Compromising an Exim Email Server
in
Malware | Hacking
.
Email is one of the most important services and protocols in our daily digital life. Without it, most of us would be non-functional...
Jun 30, 2025
Tr0jan_Horse
posted the thread
Metasploit Basics, Part 05: Using Metasploit for Reconnaissance (nmap, EternalBlue, SCADA, and MS SQL)
in
Malware | Hacking
.
Welcome back, my rookie hackers! As you know, reconnaissance is a crucial part of the hacker/pentester’s job. Without good...
Jun 30, 2025
Tr0jan_Horse
posted the thread
Hack to Spy: Building a Raspberry Spy Pi, Part 03
in
Malware | Hacking
.
In this article, I will show you how to capture full video from your Raspberry Spy Pi and then create a script that will capture video...
Jun 30, 2025
Tr0jan_Horse
posted the thread
Splunk for Security Monitoring, Part 02 (Splunk Processing Language Basics)
in
Malware | Hacking
.
Welcome back, my greenhorn hackers! In an earlier tutorial, I introduced you to Splunk for Security Monitoring. In this installment, we...
Jun 30, 2025
Tr0jan_Horse
posted the thread
Splunk for Security Monitoring, Part 01
in
Malware | Hacking
.
In recent years, a new tool has come onto the market that is becoming increasing useful and popular for monitoring a network. This tool...
Jun 30, 2025
Tr0jan_Horse
posted the thread
Windows Remote CMD Commands for Hacking
in
Malware | Hacking
.
Many new hackers come from a Windows background, but seldom–if ever–use its built-in command-line tools. As a hacker, you will often be...
Jun 30, 2025
Tr0jan_Horse
posted the thread
Linux Basics for Hackers: The Linux Logging System
in
Malware | Hacking
.
One of the most overlooked areas on the Linux operating system is the logging system. If you are a system administrator or security...
Jun 30, 2025
Tr0jan_Horse
posted the thread
Data Analytics for Cybersecurity, Part 01: Getting Started with R Programing Language for Cybersecurity Analytics
in
Malware | Hacking
.
As our digital world progresses toward a circumstance where data analytics and artificial intelligence become key components of any...
Jun 30, 2025
Tr0jan_Horse
posted the thread
Malware Analysis: Process Injection in the REMCOS RAT
in
Malware | Hacking
.
Process injection is one of those stealthy techniques malware loves to use to stay under the radar. By injecting malicious code into...
Jun 30, 2025
Tr0jan_Horse
posted the thread
IoT Embedded Linux: BusyBox, the Most Widely Used Linux in IoT
in
Malware | Hacking
.
Welcome back, my aspiring cyberwarriors! To be able to hack the Internet of Things(IoT), smart home, smart TV, IP camera, VPN, routers...
Jun 30, 2025
Tr0jan_Horse
posted the thread
NEW No-Click Critical Vulnerability in Microsoft Windows: CVE-2025-21298
in
Malware | Hacking
.
Welcome back, my aspiring cyberwarriors! Over the years, Microsoft Windows operating system, the world’s most widely used OS, has been...
Jun 30, 2025
Tr0jan_Horse
posted the thread
Bypassing Password Authentication on Win 7
in
Malware | Hacking
.
Editor’s Note: This article was submitted by Skrub, a loyal reader from my Null Byte days. Although he submitted it as two separate...
Jun 30, 2025
Loading…
Loading…
Members
Guest, join the
Premium group
to reply and read threads as you need - no limits!
Top
Bottom