15 Best Security Tools you should have on Linux
top of page
Search
When talking about security many terms come to mind. Hacking, viruses, malware, data loss, etc. Here is our list of the 15 security tools...
Hacking with Empire – PowerShell Post-Exploitation Agent
Empire is a pure PowerShell post-exploitation agent” built on cryptologically-secure communications and a flexible architecture. Empire –...
Cracking Passwords Using HASHCAT
Lets Begin the journey of Cracking Passwords….. Download Hashcat: Download the latest Hashcat on your Linux distribution (My Distribution...
PCI DSS (Payment Card Industry Data Security Standard)
The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that ALL companies that...
Static Application Security Testing vs Dynamic Application Security Testing
Static application security testing (SAST) is a set of technologies designed to analyze application source code, byte code and binaries...
How to analyse Email Headers?
Email communication is important type of written communication. Today, communications are conducted among business firms, organizations...
Shodanwave – Exploring & Obtaining Information From Cameras
Shodanwave is a tool for exploring and obtaining information from cameras specifically Netwave IP Camera. The tool uses a search engine...
PAVELOW - Exploit Toolbox
PAVELOW helps you with your exploiting and vulnerability searching adventures on KALI Linux by using a few different pre-installed tools...
Most Important Endpoint Security & Threat Intelligence Tools List
Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an...
What is Whaling Attack?
A whaling attack is a targeted attempt to steal sensitive information from a company such as financial information or personal details...
Most Important Cyber Incident Response Tools List for Penetration Testers
Cyber Incident Response Tools are more often used by security industries to test the vulnerabilities and provide an emergency incident...
CIA TRIAD
Confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide policies for information security...
Google Dorks
A Google Dork query, sometimes just referred to as a dork, is a search string that uses advanced search operators to find information...
What is Pharming Attack?
Pharming attack will redirect to the fake(phishing) page even though user enter the correct address. For Eg: facebook.com will show the...
SHODAN - SEARCH QUERY FUNDAMENTALS
To get the most out of Shodan it's important to understand the search query syntax. This article will cover the basics to help get you...
Best Hacking Distros for Penetration Testers
Penetration Testing with Linux is the best option for every Security Researcher or Penetration Tester. Here is the list of Top 10...
SHODAN - Hacker's Search Engine
Sometimes, we don't have a specific target in mind, but rather we are simply looking for vulnerable and easy-to-hack targets anywhere on...
Social Engineering - Exploiting Human Vulnerabilities
Social engineering is the term used for a broad range of malicious activities accomplished through human interactions. It uses...
Watering Hole Attack
A “watering hole attack” is one of many techniques used by cyber criminals to breach an organization’s online information system. Network...
A beginner’s guide to Tor
We live in an era of free-flowing data, where any person with an Internet connection has seemingly all the information in the world at...
bottom of page