Thursday, May 24, 2018

Blog

Blog articles other than tutorials.

Blog

Home Blog
Blog articles other than tutorials.
nmap

NMAP 7.0 Released

NMAP 7.0 What's New ? Nmap has always been the king of scanners for a Security professional. After 18 years from...
attack

World Wide Live Attack Map & Analytics

Ever wanted to see live DOS attacks across the globe ? There is a website from a security firm which...

More Core Changes in Kali Sana (V 2.0)

More Linux Core Changes in Kali Sana to be noticed.(Also applies to Other Latest Linux Distros) Recently, some core changes &...

First Look at Kali Linux 2.0

A rebirth of a penetration testing distribution – Kali Linux 2.0 Codename: Kali Sana On August 11th, Kali Linux Version 2.0...
siem

SIEM – A Beginner’s Guide

What is a SIEM ? SIEM when expanded becomes Security Information Event Management. As it’s name suggests,  the main function of...
stagefright

Stagefright – All you need to know

Find out whether your device is vulnerable & Defend against Stagefright Vulnerability Stagefright is one of the latest large scale vulnerabilities...

Must Need

passive_discovery6

Discover IPv6 network range & hosts from an IPv6 enabled network using passive_discovery6. Yet another IPv6 tool from THC Passive_discovery6 passivly sniffs the network and...

Joomla Vulnerability Component Scanner – JCS

JCS (Joomla Component Scanner) made for penetration testing reason on Joomla CMS JCS can help you with the most recent component vulnerabilities and endeavors....
Drozer

Drozer – Android Leading Security Testing Framework

Drozer (once in the past Mercury) is the main security testing framework for Android. It enables you to scan for security vulnerabilities in applications and...
reaver

Reaver + PixieWPS

All about WPS, Reaver, PixieWPS and cracking WPA2 PSK with it. Reaver is a tool to bruteforce the WPS of a WIFi router. PixeWPS is...
Androl4b

Androl4b – Android Security Virtual Machine

AndroL4b is an android security virtual machine in view of ubuntu-mate incorporates the gathering of most recent framework, tutorials and labs from various security...
FakeImageExploiter

Use a Fake image.jpg ‘FakeImageExploiter’ to Exploit Targets

FakeImageExploiter stores all records in apache2 webroot, zips (.zip) the specialist, begins apache2 and metasploit services(handler), and gives a URL to send to target...

Arping

Arping Arping is a computer software tool that is used to discover hosts on a computer network. The program tests whether a given IP address...