Let’s cover more advanced concepts and pick of where we left in part 2 of this article where we learned somehow to interact and manageRead more
Karkinos is a light-weight ‘Swiss Army Knife’ for penetration testing and/or hacking CTF’s. Currently, Karkinos offers the following: Encoding/Decoding characters Encrypting/Decrypting text or files ReverseRead more
New BlackArch Linux ISOs and OVA (2020.12.01) released with more than 2600 tools included. In this version, the developers renamed “Live ISO” to “Full ISO”Read more
Nmap which is also known as Network Mapper is one of the best open-source and the handiest tool that is widely used for security auditingRead more
Let’s dig in deeper from the previous concepts of part 1 of this article where we learned some basic day to day commands like navigatingRead more
Android is a mobile operating system based on a modified version of the Linux kernel and other open-source software, designed primarily for touchscreen mobile devicesRead more
In the previous part, we have discussed some basic firewall policies that are must require to set up a firewall. Let’s move towards some advanceRead more
In today’s era whether your is for personal use or designated to a multi-billion-dollar enterprise, no doubt security should be the number priority out ofRead more
Xerror is an automated penetration framework, which will helps security professionals and non professionals to automate their pentesting tasks. Xerror will perform all tests and,Read more
Almost every time you sign up for an online event, you get one of those wonderful calendar reminders to set an appointment reminder. In thisRead more
Introduction Password storing mechanism, ever since the genesis of Windows, has been an angle of interest from security researcher’s point of view and its implementationRead more
ADS goes here!If you don't see it, then please turn OFF
AD blocker for this website.
Our ads are not aggressive and help us
pay for the server and coffee.
THANK YOU for your support!