Sunday, April 11, 2021

Blog

Blog articles other than tutorials.

Blog

Home Blog
Blog articles other than tutorials.

First Look at Kali Linux 2.0

A rebirth of a penetration testing distribution – Kali Linux 2.0 Codename: Kali Sana On August 11th, Kali Linux Version 2.0...
Using Bulk Scripting With Remote.it

Using Bulk Scripting With remote.it

If you’re managing a fleet of devices (endpoints), you run into the challenge of managing and updating those...
attack

World Wide Live Attack Map & Analytics

Ever wanted to see live DOS attacks across the globe ? There is a website from a security firm which...
C++ Assignment Help: Everything You Need to Know

C++ Assignment Help: Everything You Need to Know

Do you have a lot of assignments to work on and no idea how to get done with...
nmap

NMAP 7.0 Released

NMAP 7.0 What's New ? Nmap has always been the king of scanners for a Security professional. After 18 years from...
Why getting app downloads from many sources is important?

Why getting app downloads from many sources is important?

There are many different ways of getting app downloads. CPA networks and display ads will provide you immediate...
PDF Over Word

7 Reasons Why You Should Use PDF Over Word

Nothing speaks about your professionalism more than using PDF file format while sending out the documents. Besides its'...
CBD Oil and the Endocannabinoid System – How Two Worlds Meet

CBD Oil and the Endocannabinoid System – How Two Worlds Meet

There was an era when no one had the slightest idea what cannabinoids, THC, and cannabidiols are. If...

How to find the dissertation writing service

Writing a dissertation is a daunting prospect and the something that lots of students and PHD candidates dread. Even...
stagefright

Stagefright – All you need to know

Find out whether your device is vulnerable & Defend against Stagefright Vulnerability Stagefright is one of the latest large scale vulnerabilities...

Must Need

PowerSploit : A PowerShell Post-Exploitation Framework

PowerSploit : A PowerShell Post-Exploitation Framework

PowerSploit is a collection of Microsoft PowerShell modules that can be used to aid penetration testers during all phases of an assessment....
Gadgetinspector : Code Analyzer For Finding Deserialization Gadget

Gadgetinspector : Code Analyzer For Finding Deserialization Gadget

Gadgetinspector is a byte code analyzer for finding deserialization gadget chains in Java applications. This project inspects Java...
AtomShields CLI : Security Testing Framework For Repositories & Source Code

AtomShields CLI : Security Testing Framework For Repositories & Source Code

AtomShields Cli is a Command-Line Interface to use the software AtomShields. AtomShields is a security testing framework for repositories and source code.
Homoglyphs

Homoglyphs – Get Similar Letters, Convert To ASCII, Detect Possible Languages...

Homoglyphs is used to get similar letters, convert to ASCII, detect possible languages and UTF-8 group. Also can say python library for getting it...

Reverse Phone Lookup and 3 more Methods to Help You Find...

A secure web hosting is an essential cog in the wheel for any online business. It does not matter whether you're just creating a...
PoshC2 : Python Server for PoshC2

PoshC2 : Python Server for PoshC2

PoshC2 is a proxy aware C2 framework that utilises Powershell and/or equivalent (System.Management.Automation.dll) to aid penetration testers with red teaming, post-exploitation and lateral movement....
Chepy : A Python lib/cli Equivalent Of The Awesome CyberChef Tool

Chepy : A Python lib/cli Equivalent Of The Awesome CyberChef Tool

Chepy is a python library with a handy cli that is aimed to mirror some of the capabilities of CyberChef. A...