Wednesday, January 16, 2019

Blog

Blog articles other than tutorials.

Blog

Home Blog
Blog articles other than tutorials.
stagefright

Stagefright – All you need to know

Find out whether your device is vulnerable & Defend against Stagefright Vulnerability Stagefright is one of the latest large scale vulnerabilities...
SIEM

SIEM – A Beginner’s Guide to Security Information and Event Management Tools

What is a SIEM? SIEM, when expanded, becomes Security Information Event Management. As its name suggests,  the main function of a...
nmap

NMAP 7.0 Released

NMAP 7.0 What's New ? Nmap has always been the king of scanners for a Security professional. After 18 years from...
attack

World Wide Live Attack Map & Analytics

Ever wanted to see live DOS attacks across the globe ? There is a website from a security firm which...

First Look at Kali Linux 2.0

A rebirth of a penetration testing distribution – Kali Linux 2.0 Codename: Kali Sana On August 11th, Kali Linux Version 2.0...

More Core Changes in Kali Sana (V 2.0)

More Linux Core Changes in Kali Sana to be noticed.(Also applies to Other Latest Linux Distros) Recently, some core changes &...

Must Need

WAF-Buster

WAF-Buster : Disrupt WAF by abusing SSL/TLS Ciphers

WAF-buster tool was created to Analyze the ciphers that are supported by the Web application firewall being used at the web server end. It...
Whatweb

whatweb – Tool to Discover Security Vulnerabilities With Your Web Application

Whatweb is the perfect name for this tool. Simply it answers the question, “What is that Website?” Whatweb can identify all sorts of information...
Miasm

Miasm – Reverse Engineering Framework In Python

Miasm is a free and open source (GPLv2) reverse engineering framework. Miasm aims to analyze / modify / generate binary programs. Here is a...
Scrounger

Scrounger – Mobile Application Testing Toolkit

Scrounger is a mobile application toolkit. The word Scrounger means a person who borrows from or lives off others. There is no better description...

Penetration Testing Resources For Simulated Attacks

Penetration testing, all the more usually called pentesting, is the act of discovering openings that could be abused in an application, system or framework...
Security Monkey

Security Monkey – AWS & GCP Accounts For Alerts On Insecure...

Security Monkey monitors your AWS and GCP accounts for policy changes and alerts on insecure configurations. Support is available for OpenStack public and private...

Update Nmap in Kali Linux

Install & Update Nmap in Kali Linux Rolling, Sana & earlier versions This tutorial will show you how to update nmap in kali linux 2.0....