PentestBox: Penetration Testing Distribution for Windows
PentestBox is not like other Penetration Testing Distributions which runs on virtual machines. It is created because more than 50% of penetration testing distributions...
Parrot Security OS for Pentesting and Computer Forensics
Parrot Security OS is a security oriented operating system designed for Pentesting, Computer Forensic, Reverse engineering, Hacking, Cloud pentesting, privacy/anonimity and cryptography. Based on...
Onapsis Bizploit – ERP & SAP Penetration Testing
Have you ever think about the vulnerabilities in your ERP and SAP system? If not then you and your organization are at risk. We...
Android Pentesting Portable Integrated Environment: Appie
Appie is a software package that has been pre-configured to function as an Android Pentesting Environment.
It is completely portable and can be carried on...
XSSYA – Cross Site Scripting Scanner & Vulnerability Confirmation
Cross-Site-Scripting (XSS) attacks are a type of injection, in which malicious
scripts are injected into otherwise benign and trusted web sites. XSS
attacks occur when an...
Source Code Analyzer for PHP Vulnerabilities – RIPS
The World Wide Web grew rapidly during the last decades and is used by millions of people every day for online shopping, banking, networking, and...
MobiSec Mobile Penetration Testing
Mobile technology has changed the way we communicate; now smartphones and applications running on these phones are crucial for any organization. The corporate sector...
FS-NyarL Pentesting & Forensics Framework
P { margin-bottom: 0.08in; }H2 { margin-bottom: 0.08in; }H2.western { font-family: "Liberation Sans",sans-serif; font-size: 14pt; font-style: italic; }H2.cjk { font-family: "Droid Sans"; font-size: 14pt;...
Why Every Site Should Be Penetration Tested
Penetration testing can get a bad rap due to the unprofessional way in which some people approach it (both clients and testers). Done correctly,...
Jigsaw Pentest Kali Linux Tutorial
Kali Linux is an advancement in Backtrack distribution, after backtrack 5 we have Kali Linux as a backtrack 6. But the team has changed...
Sandcat Browser Pen-Tester Browser
Sandcat Browser is a freeware portable pen-test oriented multi-tabbed
web browser with extensions support developed by the Syhunt team, the
same creators of the...
Hcon Security Testing Framework
HconSTF is Open Source Penetration Testing Framework based on different
browser technologies, Which helps any security professional to assists
in the Penetration testing or...
Most Read
What Makes ICS/OT Infrastructure Vulnerable?
Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...
Everything You Must Know About IT/OT Convergence
What is an Operational Technology (OT)?
Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...
Understand the OT Security and Its Importance
This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...
What is Deepfake, and how does it Affect Cybersecurity?
Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...