Skip to main content

Hacking

Social Engineering with PowerShell Empire and gophish

· 3 min read

Introduction # Word macros are one of the top sources of malware infection. Creating such a malicious macro can be done in less than 10 minutes. This article will give an insight how to perform such …

Password Cracking on Amazon EC2

· 4 min read

Introduction # Cracking with the desktop computer is not always a good idea. It can be quite noisy when you are trying to sleep. The room can become too hot for a hacker. And most important of all, …