The threat actors targeting Android users now employ a new technique to stay under the …
Here is a video showing you how to perform and SQL injection the vulnerable application …
PhishX is a python tool that can capture user credentials using a spear phishing attack.…
Nmap Automator is a great tool for initial port scans of a given ip address.…
XAttacker is a perl tool capable of scanning and auto-exploiting vulnerabilities in web applications. By…
Hacktronian is an open-source penetration testing framework designed for social engineering and multiple server…
What is Mip22? Mip22 is a modern and advanced cyber security program for use with…
So what is this phishing tool all about? Blackeye is tool scripted in shell to…
AutoRecon is an enumeration tool that performs automated enumeration with multi-threaded capabilities. It is purposely…
Many times when you want to perform an exploitation to a windows target, you need…
What is JFScan? JFScan is a great enumeration tool created by nullt3r written mainly in…
Recon-ng is a reconnaissance framework that can perform open source web based information gathering for…
So what is this Lynis tool all about? Lynis is a security tool used for…
Web Screenshot – webscreenshot.py is a great tool which comes in handy when a penetration…
The threat actors targeting Android users now employ a new technique to stay under the …
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
In today’s fast-paced business environment, corporate investigation has become a cornerstone for maintaining integrity, compliance, …
Here is a video showing you how to perform and SQL injection the vulnerable application …
Here is a tutorial where I show you how to elevate your privileges from a …