Android Vulnerability Scanner: AndroBugs
AndroBugs Framework is an Android vulnerability analysis system that helps developers or hackers find potential security vulnerabilities in Android applications. No splendid GUI interface,...
Framework to Automate Man-In-The-Middle attacks
Man-in-the-middle is one the dangerous hacking attack, cyber criminals use this attack to hack the corporate organizations. The tools to launch man-in-the-middle attack are...
Launch Exploits Against Internal Network: sonar.js
A framework for identifying and launching exploits against internal
network hosts. Works via WebRTC IP enumeration, WebSocket host scanning,
and external resource fingerprinting.
How does...
drozer – Security Testing Framework for Android
Unquestionably we can say that Android is one the leading mobile operating system, but nobody is secure; so Android also has vulnerabilities and there...
Pytbull Intrusion Detection/Prevention System Testing Framework
pytbull is an Intrusion Detection/Prevention System (IDS/IPS) Testing
Framework for Snort, Suricata and any IDS/IPS that generates an alert
file. It can be used...
OWASP Xenotix XSS Exploit Framework
H1 { margin-bottom: 0.08in; }H1.western { font-family: "Liberation Serif",serif; }H1.cjk { font-family: "Droid Sans"; }H1.ctl { font-family: "FreeSans"; }P { margin-bottom: 0.08in; }
As a...
Metasploit Tutorials From Beginner to Advance
Metasploit the database of all the exploits or a master of exploits, there are different tutorials of metasploit are available...
Volatility-Advanced Memory Forensics Framework
Computer forensic is now an important field of information security, forensic has a broad field of interest. There are different courses and trainings are...
CORE IMPACT Pro Penetration Testing Software
Metasploit is one of the best and famous penetration testing software developed by the open source community but if you think that metasploit is...
iExploder-Web Browser Quality Assurance Tester
There are different ways and method to measure the security of web application and web browsers, there are different tools available to exploit web...
Mantra-Browser Based Security Framework
There are different frameworks available for doing a penetration testing, new development has been made everyday. Let suppose if we combine different tools on...
Computer Forensic Framework-PTK
Computer forensic is a branch of digital forensic science and an act to investigate, analyze, identify and collect evidence or information which is encoded...
Most Read
What Makes ICS/OT Infrastructure Vulnerable?
Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...
Everything You Must Know About IT/OT Convergence
What is an Operational Technology (OT)?
Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...
Understand the OT Security and Its Importance
This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...
What is Deepfake, and how does it Affect Cybersecurity?
Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...