Monday, August 19, 2019

Blog

Blog articles other than tutorials.

Blog

Home Blog
Blog articles other than tutorials.

Social10x Review

Being Instagram famous takes more than just posting a few images on Instagram and taking the credit - you have...
PDF Over Word

7 Reasons Why You Should Use PDF Over Word

Nothing speaks about your professionalism more than using PDF file format while sending out the documents. Besides its'...

How to find the dissertation writing service

Writing a dissertation is a daunting prospect and the something that lots of students and PHD candidates dread. Even...
SIEM

SIEM – A Beginner’s Guide to Security Information and Event Management Tools

What is a SIEM? SIEM, when expanded, becomes Security Information Event Management. As its name suggests,  the main function of a...
nmap

NMAP 7.0 Released

NMAP 7.0 What's New ? Nmap has always been the king of scanners for a Security professional. After 18 years from...
attack

World Wide Live Attack Map & Analytics

Ever wanted to see live DOS attacks across the globe ? There is a website from a security firm which...
stagefright

Stagefright – All you need to know

Find out whether your device is vulnerable & Defend against Stagefright Vulnerability Stagefright is one of the latest large scale vulnerabilities...

More Core Changes in Kali Sana (V 2.0)

More Linux Core Changes in Kali Sana to be noticed.(Also applies to Other Latest Linux Distros) Recently, some core changes &...

First Look at Kali Linux 2.0

A rebirth of a penetration testing distribution – Kali Linux 2.0 Codename: Kali Sana On August 11th, Kali Linux Version 2.0...

Must Need

WiFiJammer

WiFiJammer – Continuously Jam All Wi-Fi Clients/Routers

WiFiJammer continuously jam all wifi clients and access points within range. The effectiveness of this script is constrained by your wireless card. Alfa cards...
Reverse Shell

Reverse Shell Cheat Sheet 2019

If it’s not possible to add a new account / SSH key / .rhosts file and just log in, your next step...
Fern Wifi Cracker

Fern Wifi Cracker For Wireless Security

Fern Wifi Cracker is a Wireless security evaluating and assault software program composed utilizing the Python Programming Language and the Python Qt GUI library,...
BurpBounty

BurpBounty – Active and Passive Scan Check Builder

BurpBounty permits you, in a speedy and basic way, to enhance the active and passive burpbounty suite scanner by methods for customized rules through...
Introspy

Introspy – Security Profiling For Blackbox iOS

Introspy is a Blackbox tool to help understand what an iOS application is doing at runtime and assist in the identification of potential security...
Scanner CLI

Scanner CLI : A Project Security/Vulnerability/Risk Scanning Tool

The Hawkeye Scanner CLI is a project security, vulnerability and general risk highlighting tool. It is meant to be integrated into your...
Python Uncompyle6 – A Cross-Version Python Bytecode Decompiler

Python Uncompyle6 – A Cross-Version Python Bytecode Decompiler

Uncompyle6 translates Python bytecode back into equivalent Python source code. It accepts bytecodes from Python version 1.3 to version 3.8, spanning over...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout