Cibersec and hacking blog
  • Twitter
  • LinkedIn
  • YouTube

hacking (3)

BadUSB

Deploying C2 malware pt.2 [2] - Flipper Zero BadUSB

Taking a step further from what we saw in the Havoc C2 post, let's take it a step further. Lets use the app BadUSB from Flipper Zero…

  • More

Deploying C2 malware pt.1 [2] - Creating C2 with HAVOC in Kali Linux

You may have heard that ‘bad guys can connect to your computer to do bad things’, but how and why? There are actually many ways to infect…

  • More

DFIR4win - Automates the artifacts extraction

Manually extracting artefacts from an infected computer can sometimes be tedious with so much information to search for, documents and logs. That's why the less time it…

  • More
Page 1 of 1

Menu

  • HOME
  • ABOUT ME
  • CATEGORIES
    • HACKING OFFENSIVE
    • HACKING DEFFENSIVE
    • FLIPPER ZERO
    • PROGRAMMING
    • LINUX
    • WINDOWS
    • NETWORKING
    • CHEATSHEETS
    • PERSONAL
    • RASPBERRY PI
  • PROJECTS

Get in touch

--== My area of expertise ==--

 

🛡 Deffensive Cibersecurity 🛡

♦️       Incident Response      ♦️
♦️         Threat Hunting         ♦️
♦️   Python and Powershell   ♦️
♦️          Bash and Linux         ♦️

 

Contact me for any issues :D

davidarribash[@]gmail[.]com

© b4shnhawx 2024 - All rights reserved