Python 3
Deep Tech
Web Apps
Blog Posts
Introduction to Pandas Python3 by infosecaddicts
Pandas is a Python package providing fast, flexible, and expressive data structures designed to make working with structured (tabular, multidimensional, potentially heterogeneous) and time series data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world data analysis in Python. Additionally, it has the broader goal of becoming the most powerful […]
Configure DVWA on Docker
Configure DVWA on Docker With docker accessing the hacking tools is much easier, in this post we will see how to use DVWA in a simple independent of the operating system so if you use windows or mac you will not have any type of problem. With the following command we can make the desired […]
Hacker Docker
We all know that with the arrival of docker it is no longer necessary to use a virtual machine for some things due to the ease and speed that docker offers. In this publication we will see some basic concepts and the way of use. Doker is designed for the world of software developers, so […]
Python and Nmap
Python is one of the best programming languages and is widely used by hackers; in this post, we will look at how we can use NMAP from python. The first thing we are going to do is install Nmap in our operating system; if you are starting in the world of cybersecurity, remember that you […]
Python modules for hackers (md5, base64, sys)
Checking in the infosecaddicts courses, I found this fantastic python code. We often use tools, but, we do not know how these work, so, in this publication we will analyze a python code to decipher passwords that you can edit according to your needs. Hackers prefer Python because it’s elementary to learn. We will analyze […]
Metasploit for beginners
Metasploit in a framework that every hacker should know, and besides that, it is a great help to perform tests. In this publication, we will work with all the commands to make it easier for you to work with them. In addition to that, I also perform some tests so that you know the power […]
Scanning local networks with ruby
Ruby is the programming language preferred by hackers, in this post I will show you how to do a simple ping on a local network to look for potential victims, faster than nmap. The code with which we will perform this is in the repository https://gist.github.com/rtlong/2907619 and belongs to Ryan Taylor Long https://gist.github.com/rtlong. There are […]
Socket Python
To start in the world of cybersecurity, to become an expert, you must take the right path. The Infosecaddicts courses will help you advance much faster and easier. In other publications, I have named many tools that you should know so that you can perform your tests in a very simple way. In this publication, […]
SILENTTRINITY
There are many tools, but, those written in python, are the ones to fall in love with, especially, SILENTTRINITY, with it, you can do several things. You will learn those in this publication, and best of all, you don’t require any previous knowledge, you just have to use it and you’ll learn. The installation is […]
Public domain information (HOST, DIG, PING, TRACEROUTE, WHOIS)
Linux has very simple commands, that at the time of an attack, we can use to obtain information quickly. All domains have a lot of useful public information, which we can consult easily with the following commands. The host command allows you to search DNSs. host infosecaddicts.com Dig (Domain Information Groper) is a command-line tool […]










