Sunday, April 11, 2021

Blog

Blog articles other than tutorials.

Blog

Home Blog
Blog articles other than tutorials.
SIEM

SIEM – A Beginner’s Guide to Security Information and Event Management Tools

What is a SIEM? SIEM, when expanded, becomes Security Information Event Management. As its...
stagefright

Stagefright – All you need to know

Find out whether your device is vulnerable & Defend against Stagefright Vulnerability Stagefright is one of the latest large scale vulnerabilities...
attack

World Wide Live Attack Map & Analytics

Ever wanted to see live DOS attacks across the globe ? There is a website from a security firm which...
nmap

NMAP 7.0 Released

NMAP 7.0 What's New ? Nmap has always been the king of scanners for a Security professional. After 18 years from...
10 Best SEO plugin for WordPress WooCommerce

10 Best SEO plugin for WordPress WooCommerce

SEO plugins are the best way to boost WordPress WooCommerce websites in search engines like Google, Yahoo, and...

Get Unlimited Free Instagram Likes or Followers Using the Followers Gallery app

Sharing the posts on Instagram are getting likes, comment, and shares is absolute fun. Some Instagram users want...

How to find the dissertation writing service

Writing a dissertation is a daunting prospect and the something that lots of students and PHD candidates dread. Even...
PDF Over Word

7 Reasons Why You Should Use PDF Over Word

Nothing speaks about your professionalism more than using PDF file format while sending out the documents. Besides its'...

Social10x Review

Being Instagram famous takes more than just posting a few images on Instagram and taking the credit - you have...
Why getting app downloads from many sources is important?

Why getting app downloads from many sources is important?

There are many different ways of getting app downloads. CPA networks and display ads will provide you immediate...

Must Need

Userrecon PY : Recognition Usernames In 187 Social Networks

Userrecon PY : Recognition Usernames In 187 Social Networks

Userrecon PY is a tool used to recognise usernames in 187 social networks. So first of all let us have a look...
Sharingan : Offensive Security Recon Tool

Sharingan : Offensive Security Recon Tool

Sharingan is a recon multitool for offensive security / bug bounty. This is very much a work in progress and I'm relatively...
MozDef: Mozilla Enterprise Defense Platform

MozDef: Mozilla Enterprise Defense Platform

The inspiration for MozDef comes from the large arsenal of tools available to attackers. Suites like metasploit, armitage, lair, dradis and others...
XSHOCK : Tool To Exploits ShellShock

XSHOCK : Tool To Exploits ShellShock

XSHOCK Shellshock Exploit. All founded directories will be saved in vulnurl.txt file. The results of the executed commands are saved in response.txt.
SkyArk : A Cloud Security Project With Two Main Scanning Modules

SkyArk : A Cloud Security Project With Two Main Scanning Modules

SkyArk is a cloud security project with two main scanning modules: AzureStealth - Scans Azure environmentsAWStealth - Scan AWS...
tcpflow

Tcpflow – To Monitor, Capture & Dump Packets

Tcpflow is a TCP/IP Demultiplexer. Tcpflow is used to record traffic mainly between 2 hosts although it can be used to monitor thousands of...
WindowsSpyBlocker

WindowsSpyBlocker – Block Spying & Tracking On Windows

WindowsSpyBlocker is an application written in Go and delivered as a single executable to block spying and tracking on Windows systems. The initial approach...