AUTHOR NAME

Max

28 POSTS
0 COMMENTS

How Viable is a File System Mini-Filter Driver for Whitelisting File Modifications on a Windows Volume (ransomware protection)?

The type of mini-filter described in this context is a File System Mini-Filter Driver, specifically designed to intercept and control file I/O operations on...

Python XOR – Running Encrypted Python Code from Memory

This program will execute XOR encrypted ciphertext (Python code) when provided the right passphrase or key, in memory.

Generate an Unlimited Amount of VeraCrypt Containers

The major goal of this software is to frustrate a digital forensics examination by overwhelming an investigator with encrypted containers.

LSB Steganography Password Protect with Encryption in Python using PNG Files

This software implements LSB Steganography password protect, as described and demonstrated in the link above, and in addition, message encryption. This way a user can encrypt their hidden message using Fernet, with a passphrase.

LSB (Least Significate Bit) Steganography in Python using PNG Files

Using LSB Steganography in Python to hide a message in a PNG. Input and extract hidden messages using Least Significant Bit Steganography.

Steganography by File Appending – Hiding a zip File in a jpg

Appending a ZIP file to the end of a JPG image is a straightforward process because the JPEG format's structure allows the image to remain valid and viewable in image viewers, while the ZIP file remains accessible with archive managers.

Jennifer Funk – To VPN or not to VPN with TOR

Food for thought and lunch time entertainment. To VPN or not to VPN when using TOR. You may think "Always VPN! no doubt!" Not so fast...check out this video for the pros and cons of using a VPN with TOR.

Tails Version 6.0 – 2/27/2024

We are very excited to present you Tails 6.0, the first version of Tails based on Debian 12 (Bookworm) and GNOME 43. Tails 6.0 brings new versions of most of the software included in Tails as well as several important security and usability improvements.

Disable bash History on Debian 12 for a Single User

While .bash_history is the default for storing command history in Bash, users can configure a different filename, location, or disable bash history by setting the HISTFILE environment variable.

Metasploit Meterpreter timestomp and Verification with Autopsy

Timestomping is a technique used to manipulate the timestamps associated with files on a computer system, such as the creation, modification, and access times, in order to conceal or alter the chronological history of a file's activity.

Latest news