Wednesday, April 14, 2021

Blog

Blog articles other than tutorials.

Blog

Home Blog
Blog articles other than tutorials.
nmap

NMAP 7.0 Released

NMAP 7.0 What's New ? Nmap has always been the king of scanners for a Security professional. After 18 years from...
attack

World Wide Live Attack Map & Analytics

Ever wanted to see live DOS attacks across the globe ? There is a website from a security firm which...
stagefright

Stagefright – All you need to know

Find out whether your device is vulnerable & Defend against Stagefright Vulnerability Stagefright is one of the latest large scale vulnerabilities...

More Core Changes in Kali Sana (V 2.0)

More Linux Core Changes in Kali Sana to be noticed.(Also applies to Other Latest Linux Distros) Recently, some core changes &...

First Look at Kali Linux 2.0

A rebirth of a penetration testing distribution – Kali Linux 2.0 Codename: Kali Sana On August 11th, Kali Linux Version 2.0...

Must Need

Applepie : A Hypervisor For Fuzzing Built With WHVP & Bochs

Applepie : A Hypervisor For Fuzzing Built With WHVP & Bochs

Hello! Welcome to applepie! This is a tool designed for fuzzing, introspection, and finding bugs! This is a hypervisor using the Windows...
Barq: The AWS Cloud Post Exploitation Framework

Barq: The AWS Cloud Post Exploitation Framework

Barq is a post-exploitation framework that allows you to easily perform attacks on a running AWS infrastructure. It allows you to attack...
Blisqy : Exploit Time-Based Blind-SQL Injection In HTTP-Headers

Blisqy : Exploit Time-Based Blind-SQL Injection In HTTP-Headers

Blisqy is a tool to aid Web Security researchers to find Time-based Blind SQL injection on HTTP Headers and also exploitation of...
Steal NTLM Hashes

Bad-PDF To Steal NTLM Hashes From Windows Machines

Bad-PDF make pernicious PDF to steal NTLM Hashes from windows machines, it use defenselessness revealed by checkpoint group to make the malicious PDF record....
Cnitch : Container Snitch Checks Running Processes Under The Docker Engine

Cnitch : Container Snitch Checks Running Processes Under The Docker Engine

Cnitch (snitch or container snitch) is a simple framework and command line tool for monitoring Docker containers to identify any processes which...
Diceware Password Generator : Generate High Entropy Passwords

Diceware Password Generator : Generate High Entropy Passwords

Diceware is a method used to generate cryptographically strong memorable passphrases. This is a python implementation of the diceware password generating algorithm....
Manul : A Coverage-Guided Parallel Fuzzer For Open-Source And Blackbox Binaries On Windows, Linux & Macos

Manul : A Coverage-Guided Parallel Fuzzer For Open-Source And Blackbox Binaries...

Manul is a coverage-guided parallel fuzzer for open-source and black-box binaries on Windows, Linux and macOS (beta) written in pure Python.