Sunday, August 25, 2019

Blog

Blog articles other than tutorials.

Blog

Home Blog
Blog articles other than tutorials.

Social10x Review

Being Instagram famous takes more than just posting a few images on Instagram and taking the credit - you have...

First Look at Kali Linux 2.0

A rebirth of a penetration testing distribution – Kali Linux 2.0 Codename: Kali Sana On August 11th, Kali Linux Version 2.0...

More Core Changes in Kali Sana (V 2.0)

More Linux Core Changes in Kali Sana to be noticed.(Also applies to Other Latest Linux Distros) Recently, some core changes &...
PDF Over Word

7 Reasons Why You Should Use PDF Over Word

Nothing speaks about your professionalism more than using PDF file format while sending out the documents. Besides its'...
SIEM

SIEM – A Beginner’s Guide to Security Information and Event Management Tools

What is a SIEM? SIEM, when expanded, becomes Security Information Event Management. As its name suggests,  the main function of a...
stagefright

Stagefright – All you need to know

Find out whether your device is vulnerable & Defend against Stagefright Vulnerability Stagefright is one of the latest large scale vulnerabilities...

How to find the dissertation writing service

Writing a dissertation is a daunting prospect and the something that lots of students and PHD candidates dread. Even...
attack

World Wide Live Attack Map & Analytics

Ever wanted to see live DOS attacks across the globe ? There is a website from a security firm which...
nmap

NMAP 7.0 Released

NMAP 7.0 What's New ? Nmap has always been the king of scanners for a Security professional. After 18 years from...

Must Need

Kubolt : Utility For Scanning Public Kubernetes Clusters

Kubolt : Utility For Scanning Public Kubernetes Clusters

Kubolt is simple utility for scanning public unauthinticated kubernetes clusters and run commands inside containers. Sometimes, the kubelet port 10250 is...
AhMyth

AhMyth Android Rat – Remote Administration Tool

AhMyth Android RAT is an Android Remote Administration Tool. It consists of two parts : Server side : Desktop application based on electron framework...
HABU

HABU – Network Penetration Testing Toolkit for Hackers and Pentesters

Habu is a python network hacking toolkit. This tool basic functions that help with some tasks for Ethical Hacking and Penetration Testing. Most of...
LiveHiddenCamera : Library Which Record Live Video & Audio From Android Device Without Displaying A Preview

LiveHiddenCamera : Library Which Record Live Video & Audio From Android...

LiveHiddenCamera is a library which record live video and audio from Android device without displaying a preview.
Cocospy Keylogger

Monitor Smartphone usage with Cocospy Keylogger

No one can doubt the advantages that smartphones have.  For parents, you now have a dependable babysitter with your smart device.  While...
Security Monkey

Security Monkey – AWS & GCP Accounts For Alerts On Insecure...

Security Monkey monitors your AWS and GCP accounts for policy changes and alerts on insecure configurations. Support is available for OpenStack public and private...
ReverseTCPShell : PowerShell ReverseTCP Shell, Client & Server

ReverseTCPShell : PowerShell ReverseTCP Shell, Client & Server

ReverseTCPShell is a tool for Reverse Encrypted (AES 256-bit) Shell over TCP using PowerShell SecureString. Attacker (C2-Server Listener):

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout