SkybreakerEngineer,

My favorite cybersecurity tool is the clue-by-four. I apply it directly to Layer 8 problems.

Enkrod,

I see you know how to deal with ID-10t errors.

wookiepedia,

nmap

north,
@north@fosstodon.org avatar

@JackSparrow174 I find myself using curl far more often than anything else.

(s/o @bagder)

sumikko,

ffuf, hashcat, burpsuite and linpeas

jabberati,
@jabberati@social.anoxinon.de avatar
hellfire103,
@hellfire103@sopuli.xyz avatar

I have a page on my Gemini capsule with a list of the software I use. Ask away about my reasons for any of the entries.

Gemini | HTTPS

I also quite like LUKS, VeraCrypt, and geli(8) for disk encryption, and I use mainly physical media (e.g. CDs) for music and video.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • privacyguides@lemmy.one
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #