Wednesday, September 23, 2020

Blog

Blog articles other than tutorials.

Blog

Home Blog
Blog articles other than tutorials.
SIEM

SIEM – A Beginner’s Guide to Security Information and Event Management Tools

What is a SIEM? SIEM, when expanded, becomes Security Information Event Management. As its...
stagefright

Stagefright – All you need to know

Find out whether your device is vulnerable & Defend against Stagefright Vulnerability Stagefright is one of the latest large scale vulnerabilities...
attack

World Wide Live Attack Map & Analytics

Ever wanted to see live DOS attacks across the globe ? There is a website from a security firm which...
nmap

NMAP 7.0 Released

NMAP 7.0 What's New ? Nmap has always been the king of scanners for a Security professional. After 18 years from...

More Core Changes in Kali Sana (V 2.0)

More Linux Core Changes in Kali Sana to be noticed.(Also applies to Other Latest Linux Distros) Recently, some core changes &...

How to find the dissertation writing service

Writing a dissertation is a daunting prospect and the something that lots of students and PHD candidates dread. Even...
PDF Over Word

7 Reasons Why You Should Use PDF Over Word

Nothing speaks about your professionalism more than using PDF file format while sending out the documents. Besides its'...

Social10x Review

Being Instagram famous takes more than just posting a few images on Instagram and taking the credit - you have...
Why getting app downloads from many sources is important?

Why getting app downloads from many sources is important?

There are many different ways of getting app downloads. CPA networks and display ads will provide you immediate...

First Look at Kali Linux 2.0

A rebirth of a penetration testing distribution – Kali Linux 2.0 Codename: Kali Sana On August 11th, Kali Linux Version 2.0...

Must Need

Words Scraper : Selenium Based Web Scraper To Generate Passwords List

Words Scraper : Selenium Based Web Scraper To Generate Passwords List

Selenium based web scraper to generate passwords list. Installation $Download Firefox webdriver from https://github.com/mozilla/geckodriver/releases$...
Airbash

Airbash – A Shell Script For Automated WPA PSK Handshake Capture

Airbash is a POSIX-compliant, completely computerized WPA PSK handshake capture script went for penetration testing. It is perfect with Bash and Android Shell (tried...

Tips for paper writing for final assignment

Students are in high school and have just gotten major term paper assignments and are not a little five hundreds of words. Actually...
FinDOM-XSS : A Fast DOM Based XSS Vulnerability Scanner With Simplicity

FinDOM-XSS : A Fast DOM Based XSS Vulnerability Scanner With Simplicity

FinDOM-XSS is a tool that allows you to finding for possible and/ potential DOM based XSS vulnerability in a fast manner.
Exist : Web App For Aggregating & Analyzing Cyber Threat Intelligence

Exist : Web App For Aggregating & Analyzing Cyber Threat Intelligence

EXIST is a web application for aggregating and analyzing CTI (cyber threat intelligence). It is written by the following software.
TeleGram-Scraper : Telegram Group Scraper Tool

TeleGram-Scraper : Telegram Group Scraper Tool

TeleGram-Scraper is a telegram group scraper tool to fetch all information about group members. How To Install &...
UDP2Raw Tunnel

UDP2Raw Tunnel – A Tunnel which Turns UDP Traffic into Encrypted...

Udp2raw Tunnel is a tunnel which turns UDP Traffic into Encrypted FakeTCP/UDP/ICMP Traffic by using Raw Socket, helps you Bypass UDP FireWalls(or Unstable UDP...