Tuesday, January 28, 2020

Blog

Blog articles other than tutorials.

Blog

Home Blog
Blog articles other than tutorials.
SIEM

SIEM – A Beginner’s Guide to Security Information and Event Management Tools

What is a SIEM? SIEM, when expanded, becomes Security Information Event Management. As its...

Social10x Review

Being Instagram famous takes more than just posting a few images on Instagram and taking the credit - you have...
PDF Over Word

7 Reasons Why You Should Use PDF Over Word

Nothing speaks about your professionalism more than using PDF file format while sending out the documents. Besides its'...

How to find the dissertation writing service

Writing a dissertation is a daunting prospect and the something that lots of students and PHD candidates dread. Even...
nmap

NMAP 7.0 Released

NMAP 7.0 What's New ? Nmap has always been the king of scanners for a Security professional. After 18 years from...
attack

World Wide Live Attack Map & Analytics

Ever wanted to see live DOS attacks across the globe ? There is a website from a security firm which...
stagefright

Stagefright – All you need to know

Find out whether your device is vulnerable & Defend against Stagefright Vulnerability Stagefright is one of the latest large scale vulnerabilities...

More Core Changes in Kali Sana (V 2.0)

More Linux Core Changes in Kali Sana to be noticed.(Also applies to Other Latest Linux Distros) Recently, some core changes &...

First Look at Kali Linux 2.0

A rebirth of a penetration testing distribution – Kali Linux 2.0 Codename: Kali Sana On August 11th, Kali Linux Version 2.0...

Must Need

Userrecon PY : Recognition Usernames In 187 Social Networks

Userrecon PY : Recognition Usernames In 187 Social Networks

Userrecon PY is a tool used to recognise usernames in 187 social networks. So first of all let us have a look...
SQL Injection Tools

Top 5 SQL Injection Tools for PenTest & Hacking

SQL injection is a code injection technique, used to attack data-driven applications that might destroy your database. Here, malicious codes are...

smurf6

Perform a Smurf attack  and  a Distributed Denial of Service (DDoS) attack on a on whole IPv6 network using smurf6 Smurf6 is a tool to...
OSINT Resources

Best OSINT Resources To Gather Information From Free Tools Or Resources

Open-source intelligence or OSINT Resources is data gathering from freely accessible sources to be utilized as a part of a knowledge setting. In the...
What’s the best Internet Service Provider in NYC?

What’s the best Internet Service Provider in NYC?

The Internet is no longer a luxury. It is a part of our daily lives and imagining life without it seems impossible....
Dfirtrack

Dfirtrack : The Incident Response Tracking Application

DFIRTrack (Digital Forensics and Incident Response Tracking application) is an open source web application mainly based on Django using a PostgreSQL database backend.
MemProcFS : The Memory Process File System

MemProcFS : The Memory Process File System

MemProcFS the Memory Process File System is an easy and convenient way of accessing physical memory as files a virtual file system....