Home Pen-Testing

Pen-Testing

How to Create an Activity Log for WordPress Sites (And Why You Should)

One of the most critical aspects of web security is being able to monitor what happens on your site. To do this effectively, you could implement...

Habu: Python Network Hacking Toolkit

These are essential capacities that assist with a few undertakings for Ethical Hacking and Penetration Testing. A great part of the capacities are truly...

Termineter: Penetration Testing of Smart Meters

Termineter is a Python framework which provides a platform for the security testing of smart meters. It implements the C1218 and C1219 protocols for...

How To Use Mobile App Penetration Testing In 5 Easy Steps?

Oh, the era of endless mobility. There’s an app for everything nowadays. There’s even a tooth-fairy calculator application for iOS that evaluates the appropriate price for...

Ethical Hacking and Penetration Testing Using Kali Linux

Kali Linux is the world’s best known operating system for ethical hacking purposes. It is developed by Offensive security as the rewrite of BackTrack....

APT2: Automated Penetration Toolkit

Automated Penetration Toolkit can perform an NMap scan and import the scan results from Nexpose, Nessus and other scanning tools. The results are further...

OWTF: OWASP Offensive Web Testing Framework

OWTF is OWASP’s (Open Web Application Security Project) Offensive Web Testing Framework. This tool automates the manual and un-creative part of pen-testing. OWASP’s project...

Top 10 Web Application Vulnerability Scanners

A web vulnerability scanner is a program which works on a web application in order to discover potential security vulnerabilities and architectural flaws. It...

Hacking MongoDB (NOSQL) training for Pentesters

MongoDB (aka NOSQL) seems a secure database, but there is no security and don’t forget the height of human stupidity. EH Academy announces the...

Why Automation is important in Web Application Security Assessment?

The importance of vulnerability assessment is the unearth fact and nobody can’t deny it. The technology has revolved in the recent years, the world...

Next-gen BurpSuite Penetration Testing Tool

Welcome to the next generation of web application penetration testing - using WebKit to own the web. BurpKit is a BurpSuite plugin which helps in...

Discover: Automate Penetration Testing Tasks

git clone git://github.com/leebaird/discover.git /opt/discover/ All scripts must be ran from this location. cd /opt/discover/ ./setup.sh ./discover.sh RECON 1.  Domain 2.  Person 3.  Parse salesforce SCANNING 4.  Generate target list 5.  CIDR 6.  List 7.  IP or domain WEB 8. ...
- Advertisment -

Most Read

Improving WordPress Security in 2021

What Is WordPress? WordPress is a PHP-based content management system that may be used in conjunction with MySQL. The best part about WordPress is that...

OSINT Tutorial to Discover Antivirus of the Target

This OSINT tutorial demonstrates the "RECON-NG tool" on Kali Linux. It discovers the type of Anti-Virus software (AV) the victim is running on their...

Cracking Password Protected ZIP, RAR & PDF using Zydra

Having confidential documents on a system, like a pdf of financial data or a zip including personal images and videos, ensure they're password-protected so...

Four Ways SASE is Revolutionizing Network Security 

Are you interested in a network that offers amazing security features without compromising high-speed performance? With SASE, you don't have to settle for less....