Wednesday, March 3, 2021

Cyber security

Home Cyber security
What is DNS Filtering and How to Use It for Safe Browsing

What is DNS Filtering and How to Use It for Safe Browsing

In the simplest terms, Domain Name System (DNS) filtering is a method by which users of home, school,...
10 Important Directories Every New Linux User Should Know

10 Important Directories Every New Linux User Should Know

Migrating from Windows to Linux can be a tricky affair, especially where you have little to no experience...
Protect Yourself from Cyber Attacks

Protect Yourself from Cyber Attacks

Imagine a scenario where you purchased an item online using a public hotspot. A couple of days or...
What Are the Benefits of Studying Cybersecurity Nowadays?

What Are the Benefits of Studying Cybersecurity Nowadays?

Just think about it: each time you use any of your devices, you risk losing your private data....
HOW TO AVOID RANSOMWARE ATTACK?

HOW TO AVOID RANSOMWARE ATTACK?

Ransomware is a malware which is used by cyber criminals for wresting money. The criminal holds some important...
What Are The Components of SQL Server?

What Are The Components of SQL Server?

To make effective use of SQL Server, you need to get to grips with the key components that...

Get Sassy About SASE – Avoid The Dangers of Watering Hole Attacks!

During the dry season on the plains of Africa, water is scarce. Wild animals will flock to any...
IT Outstaffing In Ukraine: Pros and Cons

IT Outstaffing In Ukraine: Pros and Cons

In the meantime, with the demand in the IT market, many business owners are searching for skilled professionals...
The Importance of Using a VPN While Torrenting

The Importance of Using a VPN While Torrenting

Torrenting is today’s leading way to share files over the Internet. In the past, friends and family shared...
https://1.bp.blogspot.com/-mQLjxQvgtIQ/X2HyZA9rQaI/AAAAAAAAKeI/sUk_OLYDFbg1eKgcDEQh6iFbP72O6LR5QCLcBGAsYHQ/s16000/KUBERNETES.png

Deploying & Securing Kubernetes Clusters

Kubernetes is an open-source platform that allows you to manage workloads that are in a container. This enables...

Must Need

DNS Rebinding Tool : DNS Rebind Tool With Custom Scripts

DNS Rebinding Tool : DNS Rebind Tool With Custom Scripts

This project is meant to be an All-in-one Toolkit to test further DNS rebinding attacks and my take on understanding these kind of attacks....
KaliTorify : Transparent Proxy Through Tor For Kali Linux OS

KaliTorify : Transparent Proxy Through Tor For Kali Linux OS

Kalitorify is a shell script for Kali Linux which use iptables settings to create a Transparent Proxy through the Tor Network, the program also allows you to perform...
Atlas : Quick SQLMap Tamper Suggester v1.0

Atlas : Quick SQLMap Tamper Suggester v1.0

Atlas is an open source tool that can suggest sqlmap tampers to bypass WAF/IDS/IPS, the tool is based on returned status code.
APK-MITM : Android APK Files for HTTPS Inspection

APK-MITM : Android APK Files for HTTPS Inspection

APK-MITM is a CLI application that automatically prepares Android APK files for HTTPS inspection. Inspecting a mobile app's...
How to Market Your IT Security Business or Consultancy

How to Market Your IT Security Business or Consultancy

Managing an IT security business or consultancy is difficult enough on its own. Add in the necessity of marketing your skills and...
Reload.sh

Reload.sh : Reinstall, Restore & Wipe Your System Via SSH, Without...

Reload.sh is a tool to reinstall, restore and wipe your system from the level and in the place of the running...
DNSProbe : Tool That Allows You To Perform Multiple DNS Queries

DNSProbe : Tool That Allows You To Perform Multiple DNS Queries

DNSProbe is a tool built on top of retryabledns that allows you to perform multiple dns queries of your choice with a...