Download links

14 comments

  1. Hey interesting compilation of articles and research. I had done linux hardening and *nix based research papers, so could I contribute it here as a community effort?

    Regards,
    Shritam Bhowmick

    ReplyDelete
  2. sure bhai ji :)
    forward your material in txt file at linuxmannu@gmail.com

    ReplyDelete
  3. It's a really good ideas And Thanks a lots For uploading useful stuffs...

    ReplyDelete
  4. good stuff big brother

    ReplyDelete
  5. Bhai ji can you out the article on how to evade ids and honey pots ... :)

    ReplyDelete
    Replies
    1. i have worked only on mod_security bypassing and as per that experience , i got a result according to which if something is detecting intrusion/blocking you on the basis of specific keywords/pattern in request body IDS will note that request and will perform specified action.
      so for evasion, you just need to avoid that keyword/pattern and done :D

      Delete
    2. My fucking honeypot

      Delete
  6. How R U Munna, Hope U remember me
    - HackerCrackerTracker | G.J.theDJ

    ReplyDelete
    Replies
    1. Yes Bhai ji, i am doing great and hopefully you are also enjoying life.

      Delete
  7. Yes bhai ji :)
    i dont know where are you but hope you are doing good and everything is fine.
    Please ping me if you can......

    ReplyDelete
  8. Respect for mannu bhai ji, so much informative bro, thank you bro

    ReplyDelete
  9. Thank you. . .

    ReplyDelete
  10. good work bhai ji and lets contineu

    ReplyDelete
  11. Hi can you upload a video of exploit Joomla SQL Injection exploiter (Version 3.2.* to 3.4.4) i don't know how to use

    ReplyDelete

:) :-) :)) =)) :( :-( :(( :d :-d @-) :p :o :>) (o) [-( :-? (p) :-s (m) 8-) :-t :-b b-( :-# =p~ :-$ (b) (f) x-) (k) (h) (c) cheer

© 2009 Start With Linux | Mannu Linux
Designed by cyb3r.gladiat0r
Posts RSSComments RSS
Back to top