Home Pen-Testing

Pen-Testing

How To Use Mobile App Penetration Testing In 5 Easy Steps?

Oh, the era of endless mobility. There’s an app for everything nowadays. There’s even a tooth-fairy calculator application for iOS that evaluates the appropriate price for...

Ethical Hacking and Penetration Testing Using Kali Linux

Kali Linux is the world’s best known operating system for ethical hacking purposes. It is developed by Offensive security as the rewrite of BackTrack....

APT2: Automated Penetration Toolkit

Automated Penetration Toolkit can perform an NMap scan and import the scan results from Nexpose, Nessus and other scanning tools. The results are further...

OWTF: OWASP Offensive Web Testing Framework

OWTF is OWASP’s (Open Web Application Security Project) Offensive Web Testing Framework. This tool automates the manual and un-creative part of pen-testing. OWASP’s project...

Top 10 Web Application Vulnerability Scanners

A web vulnerability scanner is a program which works on a web application in order to discover potential security vulnerabilities and architectural flaws. It...

Hacking MongoDB (NOSQL) training for Pentesters

MongoDB (aka NOSQL) seems a secure database, but there is no security and don’t forget the height of human stupidity. EH Academy announces the...

Why Automation is important in Web Application Security Assessment?

The importance of vulnerability assessment is the unearth fact and nobody can’t deny it. The technology has revolved in the recent years, the world...

Next-gen BurpSuite Penetration Testing Tool

Welcome to the next generation of web application penetration testing - using WebKit to own the web. BurpKit is a BurpSuite plugin which helps in...

Discover: Automate Penetration Testing Tasks

git clone git://github.com/leebaird/discover.git /opt/discover/ All scripts must be ran from this location. cd /opt/discover/ ./setup.sh ./discover.sh RECON 1.  Domain 2.  Person 3.  Parse salesforce SCANNING 4.  Generate target list 5.  CIDR 6.  List 7.  IP or domain WEB 8. ...

PentestBox: Penetration Testing Distribution for Windows

PentestBox is not like other Penetration Testing Distributions which runs on virtual machines. It is created because more than 50% of penetration testing distributions...

Parrot Security OS for Pentesting and Computer Forensics

Parrot Security OS is a security oriented operating system designed for Pentesting, Computer Forensic, Reverse engineering, Hacking, Cloud pentesting, privacy/anonimity and cryptography. Based on...

Onapsis Bizploit – ERP & SAP Penetration Testing

Have you ever think about the vulnerabilities in your ERP and SAP system? If not then you and your organization are at risk. We...
- Advertisment -

Most Read

Security Against Hacks: A Simple Game of Economics

One of the cold hard truths behind cybersecurity is that it's impossible to prevent a hack 100% of the time. It only takes one...

Certain Things That You Must Know About Microsoft MS-500 Exam and Its Practice Tests

If you want to be a Microsoft 365 security administrator, then there would be a number of responsibilities that will fall on your shoulders,...

Quick Ways to Avoid Being Watched by the NSA’s PRISM Program

Big brother is on the watch online. Today, a week hardly passes without news of government spying, whistleblowers, cell phone hacking, or even private photos...

Android Post Exploitation: Exploit ADB using Ghost Framework in Kali Linux

This article is the part of Android Hacking tutorial; it covers step by step guide to exploit Android ADB to get the persistent connection...

LOOKING FOR HACKING RECIPES FORM THE PRO?

Then sign up for FREE to the ehacking’s exclusive group. You will get the exclusive tips/tricks, tutorials, webinars & courses that I ONLY share with my fellow on this exclusive newsletter.