Monday, August 20, 2018

Blog

Blog articles other than tutorials.

Blog

Home Blog
Blog articles other than tutorials.
nmap

NMAP 7.0 Released

NMAP 7.0 What's New ? Nmap has always been the king of scanners for a Security professional. After 18 years from...
stagefright

Stagefright – All you need to know

Find out whether your device is vulnerable & Defend against Stagefright Vulnerability Stagefright is one of the latest large scale vulnerabilities...
attack

World Wide Live Attack Map & Analytics

Ever wanted to see live DOS attacks across the globe ? There is a website from a security firm which...

First Look at Kali Linux 2.0

A rebirth of a penetration testing distribution – Kali Linux 2.0 Codename: Kali Sana On August 11th, Kali Linux Version 2.0...

More Core Changes in Kali Sana (V 2.0)

More Linux Core Changes in Kali Sana to be noticed.(Also applies to Other Latest Linux Distros) Recently, some core changes &...
SIEM

SIEM – A Beginner’s Guide to Security Information and Event Management Tools

What is a SIEM? SIEM, when expanded, becomes Security Information Event Management. As its name suggests,  the main function of a...

Must Need

bluelog

Bluelog

Simple Bluetooth Discovery with Bluelog Bluelog is a simple Bluetooth scanner that is designed to essentially do just one thing, log all the discoverable devices...
PacVim

PacVim – A Game That Teaches You Vim Commands

PacVim is a free open source, text-based game that teaches you vim commands in a simple and fun manner.  In spite of the fact...
JCS

JCS – Joomla Vulnerability For Penetration Testing Component Scanner

JCS (Joomla Component Scanner) made for penetration testing purpose on Joomla CMS JCS can help you with the latest component vulnerabilities and exploits. Database...
Rootstealer

Rootstealer – Trick To Inject Commands On Root Terminal

Rootstealer is an example of new attack using X11. This tool is used to detect when linux users open terminal with root and inject...
Dnsenum

Dnsenum – Tool for DNS enumeration to find DNS Servers

Dnsenum is a tool for DNS enumeration, which is the process of locating all DNS servers and DNS entries for an organization. DNS enumeration will allow us...

passive_discovery6

Discover IPv6 network range & hosts from an IPv6 enabled network using passive_discovery6. Yet another IPv6 tool from THC Passive_discovery6 passivly sniffs the network and...
Delta

Delta – SDN Security Evaluation & Penetration Testing Framework

DELTA is a penetration testing framework that regenerates known attack scenarios for diverse test cases. This framework also provides the capability of discovering unknown...