Thursday, September 24, 2020

Blog

Blog articles other than tutorials.

Blog

Home Blog
Blog articles other than tutorials.
Why getting app downloads from many sources is important?

Why getting app downloads from many sources is important?

There are many different ways of getting app downloads. CPA networks and display ads will provide you immediate...
SIEM

SIEM – A Beginner’s Guide to Security Information and Event Management Tools

What is a SIEM? SIEM, when expanded, becomes Security Information Event Management. As its...

Social10x Review

Being Instagram famous takes more than just posting a few images on Instagram and taking the credit - you have...
PDF Over Word

7 Reasons Why You Should Use PDF Over Word

Nothing speaks about your professionalism more than using PDF file format while sending out the documents. Besides its'...

How to find the dissertation writing service

Writing a dissertation is a daunting prospect and the something that lots of students and PHD candidates dread. Even...
nmap

NMAP 7.0 Released

NMAP 7.0 What's New ? Nmap has always been the king of scanners for a Security professional. After 18 years from...
attack

World Wide Live Attack Map & Analytics

Ever wanted to see live DOS attacks across the globe ? There is a website from a security firm which...
stagefright

Stagefright – All you need to know

Find out whether your device is vulnerable & Defend against Stagefright Vulnerability Stagefright is one of the latest large scale vulnerabilities...

More Core Changes in Kali Sana (V 2.0)

More Linux Core Changes in Kali Sana to be noticed.(Also applies to Other Latest Linux Distros) Recently, some core changes &...

First Look at Kali Linux 2.0

A rebirth of a penetration testing distribution – Kali Linux 2.0 Codename: Kali Sana On August 11th, Kali Linux Version 2.0...

Must Need

SSRF Sheriff : Server Side Request Forgery

SSRF Sheriff : Server Side Request Forgery

SSRF Sheriff is an SSRF testing sheriff written in Go. It was originally created for the Uber H1-4420 2019 London Live Hacking...
H2Buster : A Threaded, Recursive, Web Directory Brute-Force Scanner Over HTTP/2

H2Buster : A Threaded, Recursive, Web Directory Brute-Force Scanner Over HTTP/2

H2Buster is a threaded, recursive, web directory brute-force scanner over HTTP/2 using hyper, inspired by Gobuster. Following are the features;
Locator : Geolocator, IP Tracker, Device Info by URL (Serveo & Ngrok)

Locator : Geolocator, IP Tracker, Device Info by URL (Serveo &...

Locator is a tool used for Geolocator, Ip Tracker, Device Info by URL (Serveo and Ngrok). It uses tinyurl to obfuscate the...
XSpear : Powerfull XSS Scanning & Parameter Analysis

XSpear : Powerfull XSS Scanning & Parameter Analysis

XSpear is XSS Scanner on ruby gems. Key Features Pattern matching based XSS scanningDetect...
Commit-Stream : OSINT Tool For Finding Github Repositories

Commit-Stream : OSINT Tool For Finding Github Repositories

Commit-Stream drinks commit logs from the Github event firehose exposing the author details (name and email address) associated with Github repositories in...
Seeker V1.1.9 – Accurately Locate Smartphones Using Social Engineering

Seeker V1.1.9 – Accurately Locate Smartphones Using Social Engineering

Seeker is simple, just like we host phishing pages to get credentials why not host a fake page that requests your...
FDSploit : File Inclusion & Directory Traversal Fuzzing, Enumeration & Exploitation Tool

FDSploit : File Inclusion & Directory Traversal Fuzzing, Enumeration & Exploitation...

FDSploit is a file Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool. It can be used to discover and exploit Local/Remote...