Friday, July 3, 2020

Blog

Blog articles other than tutorials.

Blog

Home Blog
Blog articles other than tutorials.
SIEM

SIEM – A Beginner’s Guide to Security Information and Event Management Tools

What is a SIEM? SIEM, when expanded, becomes Security Information Event Management. As its...

Social10x Review

Being Instagram famous takes more than just posting a few images on Instagram and taking the credit - you have...
PDF Over Word

7 Reasons Why You Should Use PDF Over Word

Nothing speaks about your professionalism more than using PDF file format while sending out the documents. Besides its'...

How to find the dissertation writing service

Writing a dissertation is a daunting prospect and the something that lots of students and PHD candidates dread. Even...
nmap

NMAP 7.0 Released

NMAP 7.0 What's New ? Nmap has always been the king of scanners for a Security professional. After 18 years from...
attack

World Wide Live Attack Map & Analytics

Ever wanted to see live DOS attacks across the globe ? There is a website from a security firm which...
stagefright

Stagefright – All you need to know

Find out whether your device is vulnerable & Defend against Stagefright Vulnerability Stagefright is one of the latest large scale vulnerabilities...

More Core Changes in Kali Sana (V 2.0)

More Linux Core Changes in Kali Sana to be noticed.(Also applies to Other Latest Linux Distros) Recently, some core changes &...

First Look at Kali Linux 2.0

A rebirth of a penetration testing distribution – Kali Linux 2.0 Codename: Kali Sana On August 11th, Kali Linux Version 2.0...

Must Need

Leaked

Leaked 2.0 – A Checking tool for Hash codes, Passwords and...

Leaked 2.0 is A Checking tool for Hash codes and Passwords and Emails leaked, uses leakz module from Aidan Holland, and leakz module uses...
Blisqy : Exploit Time-based Blind-SQL Injection In HTTP-Headers

Blisqy : Exploit Time-based Blind-SQL Injection In HTTP-Headers

Leviathan is a mass audit toolkit which has wide range service discovery, brute force, SQL injection detection and running custom exploit capabilities....
Karonte : Static Analysis Tool To Detect Multi-Binary Vulnerabilities In Embedded Firmware

Karonte : Static Analysis Tool To Detect Multi-Binary Vulnerabilities In Embedded...

Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware. Research Paper
Microsoft WinUI : Windows UI Library Roadmap

Microsoft WinUI : Windows UI Library Roadmap

WinUI is the native UI platform for Windows 10. This document outlines the prospective roadmap for new website through 2019 and into...
Vulmap :Online Local Vulnerability Scanners Project

Vulmap :Online Local Vulnerability Scanners Project

Vulmap is an open source online local vulnerability scanner project. It consists of online local vulnerability scanning programs for Windows and Linux...
Liffy : Local File Inclusion Exploitation Tool

Liffy : Local File Inclusion Exploitation Tool

Liffy is a local file inclusion exploitation tool. A little python tool to perform Local file inclusion. Liffy-v2.0 is...
DNSDmpstr

DNSDmpstr : Unofficial API & Client for DnsDumpster & HackerTarget

DNSDmpstr is an unofficial API & Client for DNS Dumpster and HackerTarget.com IP tools. DNS dumpster is a FREE...