Open in app
Home
Notifications
Lists
Stories

Write
Febi Mudiyanto
Febi Mudiyanto

Home
About

Published in InfoSec Write-ups

·Jun 20

Create a Hidden IRC Server with The Onion Router (TOR)

A guide to make secret communication with the untraceable IRC server — Do you wanna build a secret communication with your anonymous team? Or, You have a secret project with a secret team member? In this article, I would support what you need. IRC stands for Internet Relay Chat, is a text-based chat system for instant messaging (https://en.wikipedia.org/wiki/Internet_Relay_Chat). …

Tor

4 min read

Create a Hidden IRC Server with The Onion Router (TOR)
Create a Hidden IRC Server with The Onion Router (TOR)

Published in Python in Plain English

·Jun 5

Python Traceroute with a Visualization like in the ‘Hacker Movie Scene’

Traceroute is a tool for checking where is your packet/traffic is routed on the internet. This thing is a wonderful for troubleshooting the network. Honestly this article and python program made by me but inspired by computerphile. Here is the video if you wanna watch after reading my article. …

Traceroute

3 min read

Python Traceroute with a Visualization like in the ‘Hacker Movie Scene’
Python Traceroute with a Visualization like in the ‘Hacker Movie Scene’

Published in InfoSec Write-ups

·May 28

Bypass the Firewall with SSH Tunnelling

a guide to make an SSH tunnel for accessing blocked port over port 22 — Do you work for a company? You have a problem with their firewall? Or are you a hacker who making the netcat listener in your local computer? This article fit for you. Because today I will explain you how making an ssh tunnel for accessing blocked port over port 22. …

Firewall

3 min read

Bypass the Firewall with SSH Tunnelling
Bypass the Firewall with SSH Tunnelling

Published in Python in Plain English

·May 15

How to Sync Files with an Offline Storage Using Python

Guide to making a program for syncing files with offline storage — Long time no write articles on Medium. Today I wanna explain to you my new Python project about syncing files to offline storage such as an external hard drive or any shared folder. The objective of this program is: 1. The program must have a config file for saving the…

Python

3 min read

How to Sync Files with an Offline Storage Using Python
How to Sync Files with an Offline Storage Using Python

Published in Python in Plain English

·Mar 27

Automate the Local Certificate Authority Registration with Python

How to make a self-signed SSL certificate with your own CA — What is an SSL Certificate? If you have a padlock icon beside the URL in the browser, it’s meant the server had the SSL certificate. This certificate is usually signed by a Certificate Authority, like Digicert, Comodo, Let’s Encrypt, etc. …

Python

4 min read

Automate the Local Certificate Authority Registration with Python
Automate the Local Certificate Authority Registration with Python

Published in InfoSec Write-ups

·Mar 13

Setup Armitage as a Command & Control (C2) Framework for Free

The tutorial about how to setup Armitage — Armitage is an additional feature of the Metasploit Framework with the graphical user interface. As one of the most free C2 frameworks, Armitage still has an incredible feature for doing red teaming. Before we set up the Armitage, firstly you must know what is the requirement: 1. Metasploit → must be…

Armitage

3 min read

Setup Armitage as a Command & Control (C2) Framework for Free
Setup Armitage as a Command & Control (C2) Framework for Free

Published in Python in Plain English

·Mar 7

Python “Pip Install” Without The Internet

Read this guide to install Python packages without having access to the internet. — Sometimes server must run in the local network and with a strict firewall to the internet. And the story begins when you wanna install your python apps into your server, tomorrow. Then, before you sleep, you are thinking about “Is it possible to install my requirement.txt into the server without…

Python

3 min read

Python “Pip Install” Without The Internet
Python “Pip Install” Without The Internet

Published in InfoSec Write-ups

·Mar 7

How The Hacker Hack You Just with a Link

A guide about hacking with browser — The one famous tool for doing this is BeEF. Browser Exploit Framework or shortly as BeEF is a tool that allows you to make a controlled web page that contains JavaScript. You will be able to change the content depending on the specific client that opens your page. How to install BeEF in Kali Linux You can…

Hacking

3 min read

How The Hacker Hack You Just with a Link
How The Hacker Hack You Just with a Link

Published in InfoSec Write-ups

·Feb 28

Agent Sudo | TryHackMe Walkthrough

Finishing some CTF rooms from TryHackMe, and sharpen the hacking skills, make more practice make you better. So today I will explain about the walkthrough to solve the Agent Sudo room. Let’s catch the agent… Enumeration 1. How many open ports? 3

Tryhackme Walkthrough

4 min read

Agent Sudo | TryHackMe Walkthrough
Agent Sudo | TryHackMe Walkthrough

Published in InfoSec Write-ups

·Feb 27

How to Make Ransomware with Python

Disclaimer: This tutorial is just for educational purposes, don’t try to break any computer except yours. If you try to make real ransomware, you are breaking the law and you are going to jail. Today I will explain to you how to make ransomware and how it works with the…

Python

5 min read

How to Make Ransomware with Python
How to Make Ransomware with Python
Febi Mudiyanto

Febi Mudiyanto

Just a Learner and CTFs Player on a quite night.

Following
  • arshiadev

    arshiadev

  • Qwiklabs

    Qwiklabs

  • Renu Khandelwal

    Renu Khandelwal

  • Igor S. Bederov

    Igor S. Bederov

  • Kyle Chastain

    Kyle Chastain

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Knowable