remote-method-guesser (rmg) is a command line utility written in Java and can be used to identify security vulnerabilities on Java RMI endpoints. Currently, the followingRead more
Web Application Pentesting Tools are more often used by security industries to test the vulnerabilities of web-based applications. Here you can find the Comprehensive WebRead more
SARENKA is an Open Source Intelligence (OSINT) tool which helps you obtaining and understanding Attack Surface. The main goal is to gathering infromation from searchRead more
Big corporations trying to improve the user experience by making everything around simplify, increasing performance and connections with “IoT’s”. Today with the Android operating systemRead more
The Pi 400 makes creating a hacking system with Raspberry Pi extremely simple – it is literally burn, boot and done! The Pi 400 isRead more
Network Penetration Testing determines vulnerabilities in the network posture by discovering Open ports, Troubleshooting live systems, services and grabbing system banners. The pen-testing helps administratorRead more
Almost every time you sign up for an online event, you get one of those wonderful calendar reminders to set an appointment reminder. In thisRead more
The latest version of Kali Linux 2020.4 dropped this week. Let’s take a quick look! At first glance it seems like mostly visual changes –Read more
Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerfulRead more
What is “Kill Chain”? From Wikipedia: The term kill chain was originally used as a military concept related to the structure of an attack; consistingRead more
The Raspberry Pi is a small yet power platform that is perfect for building a cost effective cybersecurity training lab. In this article we willRead more
ADS goes here!If you don't see it, then please turn OFF
AD blocker for this website.
Our ads are not aggressive and help us
pay for the server and coffee.
THANK YOU for your support!