Tuesday, April 7, 2020

Blog

Blog articles other than tutorials.

Blog

Home Blog
Blog articles other than tutorials.
SIEM

SIEM – A Beginner’s Guide to Security Information and Event Management Tools

What is a SIEM? SIEM, when expanded, becomes Security Information Event Management. As its...

Social10x Review

Being Instagram famous takes more than just posting a few images on Instagram and taking the credit - you have...
PDF Over Word

7 Reasons Why You Should Use PDF Over Word

Nothing speaks about your professionalism more than using PDF file format while sending out the documents. Besides its'...

How to find the dissertation writing service

Writing a dissertation is a daunting prospect and the something that lots of students and PHD candidates dread. Even...
nmap

NMAP 7.0 Released

NMAP 7.0 What's New ? Nmap has always been the king of scanners for a Security professional. After 18 years from...
attack

World Wide Live Attack Map & Analytics

Ever wanted to see live DOS attacks across the globe ? There is a website from a security firm which...
stagefright

Stagefright – All you need to know

Find out whether your device is vulnerable & Defend against Stagefright Vulnerability Stagefright is one of the latest large scale vulnerabilities...

More Core Changes in Kali Sana (V 2.0)

More Linux Core Changes in Kali Sana to be noticed.(Also applies to Other Latest Linux Distros) Recently, some core changes &...

First Look at Kali Linux 2.0

A rebirth of a penetration testing distribution – Kali Linux 2.0 Codename: Kali Sana On August 11th, Kali Linux Version 2.0...

Must Need

UniFuzzer : A Fuzzing Tool For Closed-Source Binaries Based On Unicorn & LibFuzzer

UniFuzzer : A Fuzzing Tool For Closed-Source Binaries Based On Unicorn...

UniFuzzer is a fuzzing tool for closed-source binaries based on Unicorn and LibFuzzer. Currently it supports fuzzing 32-bits LSB ELF files on ARM/MIPS, which are...
CloudFrunt

CloudFrunt Tool For Identifying Misconfigured CloudFront Domains

CloudFrunt is a tool for identifying misconfigured CloudFront domains. CloudFront is a Content Delivery Network (CDN) gave by Amazon Web Services (AWS). CloudFront clients...
Findomain : A Cross-Platform Tool That Use Certificate Transparency Logs To Find Subdomains

Findomain : A Cross-Platform Tool That Use Certificate Transparency Logs To...

Findomain is a cross-platform tool that use Certificates Transparency logs to find subdomains. We currently support Linux, Windows and MacOS. All supported...
Hashboy

Hashboy : A Hash Query Tool

Hashboy is a simple hash query tool and was redeveloped on hash-buster. So let us have a look on how to...
Evilginx2

Evilginx2 : Standalone Man-In-The-Middle Attack Framework

Evilginx2 is a man-in-the-middle attack framework used for phishing login credentials along with session cookies, which in turn allows to...
Pown Duct : Essential Tool For Finding Blind Injection Attacks

Pown Duct : Essential Tool For Finding Blind Injection Attacks

Pown Duct is an essential tool for finding blind injection attacks using DNS side-channels. This tool is part of secapps.com open-source initiative.
JShielder : Hardening Script for Linux Servers/ Secure LAMP-LEMP Deployer/ CIS Benchmark G

JShielder : Hardening Script for Linux Servers/ Secure LAMP-LEMP Deployer/ CIS...

JSHielder is an Open Source Bash Script developed to help SysAdmin and developers secure there Linux Servers in which they will...