News
5 years ago
Windows Takeover with a PDF File
There are multiple ways to exploit and take over a Windows machine, today we will look at doing this with a PDF file containing a...
5 years ago
Discover & Attack Raspberry Pi’s on a Network
Many people never bother to change their default password on their devices. For a Raspberry Pi, this can leave it extremely vulner...
5 years ago
Python Scripting for the Ethical Hacker Part II
Welcome back to LSB my fellow ethical hackers, this is the second part to our Python scripting tutorial. Today we will be installi...