Metasploit Framework is a collection of exploits, shellcodes, fuzzing tools, payloads, encoders etc. Moreover, we can regard it as a…
Whatweb is the perfect name for this tool. Simply it answers the question, “What is that Website?” Whatweb can identify…
Running a tech company can leave you with a lot of clutter. Trailing wires, old devices, paperwork, and filing cabinets…
SOC stands for "security operations center", and it's important to every business, no matter what it's size. It doesn’t matter…
Passive_discovery6 passively sniffs the network and dump all client's IPv6 addresses detected. Passive_discovery6 simply sniffs for the neighbor-advertisement packet in…
Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety…
Tcpflow is a TCP/IP Demultiplexer. Tcpflow is used to record traffic mainly between 2 hosts although it can be used…
Load balancing(lbd) is the technique used in different services for balancing the load across different servers or NICs. It can…
Sqlmap is a database assessment tool which pentesters & security researchers can use to enumerate databases of various types. Sqlmap…
UA-tester is a tool to check whether a website provides different pages for different user agents like for mobile, desktop…