Thursday, February 20, 2020

Blog

Blog articles other than tutorials.

Blog

Home Blog
Blog articles other than tutorials.

Social10x Review

Being Instagram famous takes more than just posting a few images on Instagram and taking the credit - you have...

First Look at Kali Linux 2.0

A rebirth of a penetration testing distribution – Kali Linux 2.0 Codename: Kali Sana On August 11th, Kali Linux Version 2.0...
attack

World Wide Live Attack Map & Analytics

Ever wanted to see live DOS attacks across the globe ? There is a website from a security firm which...
nmap

NMAP 7.0 Released

NMAP 7.0 What's New ? Nmap has always been the king of scanners for a Security professional. After 18 years from...

How to find the dissertation writing service

Writing a dissertation is a daunting prospect and the something that lots of students and PHD candidates dread. Even...
PDF Over Word

7 Reasons Why You Should Use PDF Over Word

Nothing speaks about your professionalism more than using PDF file format while sending out the documents. Besides its'...
stagefright

Stagefright – All you need to know

Find out whether your device is vulnerable & Defend against Stagefright Vulnerability Stagefright is one of the latest large scale vulnerabilities...

More Core Changes in Kali Sana (V 2.0)

More Linux Core Changes in Kali Sana to be noticed.(Also applies to Other Latest Linux Distros) Recently, some core changes &...
SIEM

SIEM – A Beginner’s Guide to Security Information and Event Management Tools

What is a SIEM? SIEM, when expanded, becomes Security Information Event Management. As its...

Must Need

CAPE : Malware Configuration And Payload Extraction

CAPE : Malware Configuration And Payload Extraction

CAPE is a malware sandbox. It is derived from Cuckoo and is designed to automate the process of malware analysis with...

SMWYG (Show-Me-What-You-Got) : Tool To Perform OSINT & Reconnaissance On An...

SMWYG tool allows you to perform OSINT and reconnaissance on an organisation or an individual. It allows one to search 1.4 Billion clear text...
SCShell : Fileless Lateral Movement Tool That Relies On ChangeServiceConfigA To Run Command

SCShell : Fileless Lateral Movement Tool That Relies On ChangeServiceConfigA To...

SCShell is a fileless lateral movement tool that relies on ChangeServiceConfigA to run commands. The beauty of this tool is that it...
WhoAmIMailBot : Service To Mask Your E-Mails

WhoAmIMailBot : Service To Mask Your E-Mails

WhoAmIMailBot is a service to mask your e-mails. It was inspired by Blur, where you can create an alias for your...
Getsploit

Getsploit v0.2.2 – Command Line Utility For Searching And Downloading Exploits

Getsploit allows you to search online for the exploits across all the most popular collections: Exploit-DB, Metasploit, Packetstorm and others. The most powerful feature...
VulnWhisperer : Create Actionable Data From Your Vulnerability Scans

VulnWhisperer : Create Actionable Data From Your Vulnerability Scans

VulnWhisperer is a vulnerability management tool and report aggregator. VulnWhisperer will pull all the reports from the different Vulnerability scanners and create...
Apache Struts

Apache Struts Version 3 : Tool To Exploit 3 RCE Vulnerabilities...

Apache Struts Version 3 is a tool to exploit 3 RCE vulnerabilities on ApacheStruts. Script contains the fusion of 3 vulnerabilities of type RCE on...