Recon is one of the most important phases that seem easy but takes a lot of effort and skill to…
Businesses have been getting more and more digitalized. This is great, but rapid digitization has made it difficult for businesses…
As the internet continues to grow, so does the threat of cybercrime. We all know that the internet is full…
System Informer, A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. Brought to…
dBmonster you are able to scan for nearby WiFi devices and track them trough the signal strength (dBm) of their…
Concealed_Code_Execution is a set of tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows. Here…
RPCMon can help researchers to get a high level view over an RPC communication between processes. It was built like…
crAPI (completely ridiculous API) will help you to understand the ten most critical API security risks. crAPI is vulnerable by design, but…
DNS Reaper is yet another sub-domain takeover tool, but with an emphasis on accuracy, speed and the number of signatures…
ROP (Return Oriented Programming) Gadgets are small snippets of a few assembly instructions typically ending in a ret instruction which already exist…