Wednesday, September 23, 2020

Blog

Blog articles other than tutorials.

Blog

Home Blog
Blog articles other than tutorials.

Social10x Review

Being Instagram famous takes more than just posting a few images on Instagram and taking the credit - you have...
nmap

NMAP 7.0 Released

NMAP 7.0 What's New ? Nmap has always been the king of scanners for a Security professional. After 18 years from...
stagefright

Stagefright – All you need to know

Find out whether your device is vulnerable & Defend against Stagefright Vulnerability Stagefright is one of the latest large scale vulnerabilities...
attack

World Wide Live Attack Map & Analytics

Ever wanted to see live DOS attacks across the globe ? There is a website from a security firm which...
PDF Over Word

7 Reasons Why You Should Use PDF Over Word

Nothing speaks about your professionalism more than using PDF file format while sending out the documents. Besides its'...

How to find the dissertation writing service

Writing a dissertation is a daunting prospect and the something that lots of students and PHD candidates dread. Even...

First Look at Kali Linux 2.0

A rebirth of a penetration testing distribution – Kali Linux 2.0 Codename: Kali Sana On August 11th, Kali Linux Version 2.0...

More Core Changes in Kali Sana (V 2.0)

More Linux Core Changes in Kali Sana to be noticed.(Also applies to Other Latest Linux Distros) Recently, some core changes &...
SIEM

SIEM – A Beginner’s Guide to Security Information and Event Management Tools

What is a SIEM? SIEM, when expanded, becomes Security Information Event Management. As its...
Why getting app downloads from many sources is important?

Why getting app downloads from many sources is important?

There are many different ways of getting app downloads. CPA networks and display ads will provide you immediate...

Must Need

AlertResponder : Automatic Security Alert Response Framework By AWS Serverless Application Model

AlertResponder : Automatic Security Alert Response Framework By AWS Serverless Application...

AlertResponder is an automatic security alert response framework by AWS Server less Application Model. It is a server less framework for automatic...
Fileintel : A Modular Python Application To Pull Intelligence About Malicious Files

Fileintel : A Modular Python Application To Pull Intelligence About Malicious...

Fileinel is a tool used to collect various intelligence sources for a given file. Fileintel is written in a modular fashion so...
Infog

Infog – Information Gathering Tool

InfoG is a Shellscript to perform Information Gathering. Infog Features Check Website info Check Phone info IP Tracker Check Valid E-mail Check if site is...
BLUESPAWN : Windows-Based Active Defense & EDR Tool To Empower Blue Teams

BLUESPAWN : Windows-Based Active Defense & EDR Tool To Empower Blue...

BLUESPAWN helps blue teams monitor Windows systems in real-time against active attackers by detecting anomalous activity. We've created and open-sourced this for...
XXRF Shots

XXRF Shots – Useful For Testing SSRF Vulnerability

XXRF Shots is useful for testing SSRF vulnerability. Server Side Request Forgery  or SSRF is a type of vulnerability class where attacker sends crafted...
Pyrit

Pyrit : The Famous WPA Pre-Computed Cracker, Migrated from Google

Pyrit allows you to create massive databases of pre-computed WPA/WPA2-PSK authentication phase in a space-time-tradeoff. By using the...
Mimir : Smart OSINT Collection Of Common IOC Types

Mimir : Smart OSINT Collection Of Common IOC Types

Mimir is a smart OSINT collection of common IOC types. This application is designed to assist security analysts and researchers with the...