Wednesday, January 16, 2019

Blog

Blog articles other than tutorials.

Blog

Home Blog
Blog articles other than tutorials.
SIEM

SIEM – A Beginner’s Guide to Security Information and Event Management Tools

What is a SIEM? SIEM, when expanded, becomes Security Information Event Management. As its name suggests,  the main function of a...
stagefright

Stagefright – All you need to know

Find out whether your device is vulnerable & Defend against Stagefright Vulnerability Stagefright is one of the latest large scale vulnerabilities...
attack

World Wide Live Attack Map & Analytics

Ever wanted to see live DOS attacks across the globe ? There is a website from a security firm which...
nmap

NMAP 7.0 Released

NMAP 7.0 What's New ? Nmap has always been the king of scanners for a Security professional. After 18 years from...

First Look at Kali Linux 2.0

A rebirth of a penetration testing distribution – Kali Linux 2.0 Codename: Kali Sana On August 11th, Kali Linux Version 2.0...

More Core Changes in Kali Sana (V 2.0)

More Linux Core Changes in Kali Sana to be noticed.(Also applies to Other Latest Linux Distros) Recently, some core changes &...

Must Need

Osmedeus

Osmedeus – Automatic Reconnaisance and Scanning in Penetration Testing

Osmedeus is a automatic Reconnaisance and Scanning in Penetration Testing. Osmedeus allow you to do boring stuff in Pentesting automatically like reconnaissance and scanning...
Metasploit getwlanprofiles

Metasploit getwlanprofiles – Simple Script To Download Wireless Profiles From...

Metasploit getwlanprofiles is a Meterpreter script which when kept running against Windows 7 or Vista boxes will extract and download all the wireless profiles...
imR0T

imR0T – Encryption to Your Whatsapp Contact

imR0T : Send a quick message with simple text encryption to your whatsapp contact and , basically in ROT13 with new multi encryption based...
AWS Key Disabler

AWS Key Disabler – Lambda Script That Will Disable Access Keys...

The AWS Key disabler is a Lambda Function that disables AWS IAM User Access Keys after a set amount of time in order to...
Pemcracker

Pemcracker – Tool to crack encrypted PEM files

Pemcracker is a tool to crack encrypted PEM files. This tool is inspired by pemcrack by Robert Graham. The purpose is to attempt to...
Routersploit

RouterSploit – Exploitation Framework For Embedded Devices

Routersploit is an open-source exploitation Framework to perform various penetration testing operations with embedded devices. The Routersploit contains various modules that perform penetration testing operations exploits...
XSStrike

XSStrike – Most Advanced XSS Detection Suite

XSStrike is a Cross Site Scripting detection suite equipped with four hand written parsers, an intelligent payload generator, a powerful fuzzing engine and an...