www.theprohack.com Open in urlscan Pro
2a00:1450:400e:811::2013  Public Scan

URL: https://www.theprohack.com/
Submission: On August 16 via manual from GB — Scanned from GB

Form analysis 1 forms found in the DOM

GET /search

<form action="/search" id="search-form" method="get">
  <input id="sq" name="q" placeholder="Search Prohack.." type="text" value="">
  <input id="searchsubmit" type="submit" value="">
</form>

Text Content

Pro Hack

ABOUT FruxLabs LinkedIn GITHUB Rescure Cyber Threat Intelligence ADVERTISE GUEST
BLOGGING THINGS I LIKE Manager Musings CONTACT





PRO HACK

Computer security, tools, rants and misc stuff. v3.2


 * Home
 * REScure Cyber Threat Intel Feed
 * Tutorials
 * Linux
 * Windows
 * Mobile Hax
 * Web Application Hacking
   




SOME PERSPECTIVES ON THE RISE OF RANSOMWARE ATTACKS

Leave a Reply

Crime as a Service has evolved into Ransomware as a Service (“RaaS”). The rise
of ransomware attacks on companies and the way they are escalating both in terms
of scale and tactics is something that was in the making for quite some time. I
wished to document my own thoughts...


Continue reading




HOW I GOT MYSELF A CAPABLE LAPTOP

Leave a Reply

It all started with my old (and very hated) HP Pavilion notebook (i5, 12 GB RAM,
500 GB HDD) almost dying on me. I wanted to get a new laptop, the only reason I
stuck with HP for so many years was that I got it as a gift and I wanted to
squeeze every drop of use I could...

Categories: Consumer Hacking Reviews security Tips and tricks Tutorials
Continue reading




ASSESSING A CYBER SECURITY CANDIDATE

Leave a Reply

I typically assess a senior cyber security candidate across 7 basic domains for
a technical interview, before I actually jump into security. Sometimes, a
candidate is so good in these domains that asking questions about security
becomes an afterthought. A dipstick feedback...

Categories: interview tips rants security
Continue reading




THE RESCURE CYBER THREAT INTELLIGENCE PROJECT - SENSOR UPDATE

Leave a Reply

We have massively upgraded our sensor detection, logging and monitoring
capabilities at rescure.me - we detected around 350K attacks in last 24 hours
which are then funneled and curated as feeds by our co-relation system. This
included removing code cruft, updating data...

Categories: Cyber Threat Intelligence
Continue reading




THE RESCURE CYBER THREAT INTELLIGENCE PROJECT - DOMAIN BLACKLIST UPDATE

Leave a Reply

We are now publishing consumable list of malicious domains at rescure.me as part
of our independent cyber threat intelligence project. Each node below is an
event with its separate attributes (around 2 million) which are co-related in
real-time to ensure only offending,...

Categories: Cyber Threat Intelligence Hacking security
Continue reading



Pages 1 of 25 1234NextLast




LIKE OUR PAGE






POPULAR POSTS

 * Phone Codes
   I M Publishing here Mobile secret Codes,Most of them will...
 * HTC wildfire 2.2.1 root to HTC wildfire Android 2.3 | Install Android 2.3 on
   HTC Wildfire | How to root Htc Wildfire 2.2.1
   Sometime ago I got an HTC Wildfire and was having loads of...
 * Hacking Tool Extreme Collection !!!!
   Hacking Tool Extreme Collection !!!! FeliksPack3 ...
 * Using 3D Analyzer to play games without graphic Card
   “ Graphics card must have pixel shader ability of 1.1 or...


BLOG ARCHIVE

Blog Archive August 2021 (1) September 2020 (1) April 2020 (1) February 2020 (1)
October 2018 (1) September 2018 (1) December 2017 (1) June 2016 (1) May 2016 (1)
March 2016 (1) July 2015 (1) March 2015 (1) March 2014 (1) January 2014 (1)
November 2013 (1) August 2013 (1) May 2013 (3) March 2013 (7) January 2013 (2)
December 2012 (2) July 2012 (1) June 2012 (1) April 2012 (1) March 2012 (1)
February 2012 (2) January 2012 (3) December 2011 (1) November 2011 (1) October
2011 (1) September 2011 (2) August 2011 (2) July 2011 (3) June 2011 (2) May 2011
(7) April 2011 (11) March 2011 (7) February 2011 (12) January 2011 (15) December
2010 (1) November 2010 (2) October 2010 (7) September 2010 (11) July 2010 (7)
June 2010 (1) May 2010 (16) April 2010 (20) March 2010 (7) February 2010 (7)
January 2010 (9) December 2009 (7) November 2009 (1) October 2009 (7) September
2009 (6) August 2009 (6) July 2009 (19) June 2009 (11) May 2009 (7) April 2009
(13) March 2009 (18) February 2009 (26) January 2009 (22) December 2008 (34)
November 2008 (11) October 2008 (15) September 2008 (32) August 2008 (30) July
2008 (47) June 2008 (68) May 2008 (39) April 2008 (7) March 2008 (16)



SPONSORED LINKS






DIRECTORIES




BLOGROLL

Techpavan HITBSecNews CiscoZine Learn Ethical Hacking Go Hacking SecurityXploded
Copyright © 2022 Prohack.
Created by MS Design

This site uses cookies from Google to deliver its services and to analyse
traffic. Your IP address and user agent are shared with Google, together with
performance and security metrics, to ensure quality of service, generate usage
statistics and to detect and address abuse.Learn moreOk