Habu: Python Network Hacking Toolkit
These are essential capacities that assist with a few undertakings for Ethical Hacking and Penetration Testing. A great part of the capacities are truly...
Termineter: Penetration Testing of Smart Meters
Termineter is a Python framework which provides a platform for the security testing of smart meters. It implements the C1218 and C1219 protocols for...
How To Use Mobile App Penetration Testing In 5 Easy Steps?
Oh, the era of endless
mobility. There’s an app for everything nowadays. There’s even a tooth-fairy
calculator application for iOS that evaluates the appropriate price for...
Ethical Hacking and Penetration Testing Using Kali Linux
Kali Linux is the world’s best known operating system for ethical hacking purposes. It is developed by Offensive security as the rewrite of BackTrack....
APT2: Automated Penetration Toolkit
Automated Penetration Toolkit can perform an NMap scan and import the scan results from Nexpose, Nessus and other scanning tools. The results are further...
OWTF: OWASP Offensive Web Testing Framework
OWTF is OWASP’s (Open Web Application Security Project) Offensive Web Testing Framework. This tool automates the manual and un-creative part of pen-testing. OWASP’s project...
Top 10 Web Application Vulnerability Scanners
A web vulnerability scanner is a program which works on a web application in order to discover potential security vulnerabilities and architectural flaws. It...
Hacking MongoDB (NOSQL) training for Pentesters
MongoDB (aka NOSQL) seems a secure database, but there is no security and don’t forget the height of human stupidity. EH Academy announces the...
Why Automation is important in Web Application Security Assessment?
The importance of vulnerability assessment is the unearth fact and nobody can’t deny it. The technology has revolved in the recent years, the world...
Next-gen BurpSuite Penetration Testing Tool
Welcome to the next generation of web application penetration testing - using WebKit to own the web.
BurpKit is a BurpSuite plugin which helps in...
Discover: Automate Penetration Testing Tasks
git clone git://github.com/leebaird/discover.git /opt/discover/
All scripts must be ran from this location.
cd /opt/discover/
./setup.sh
./discover.sh
RECON
1. Domain
2. Person
3. Parse salesforce
SCANNING
4. Generate target list
5. CIDR
6. List
7. IP or domain
WEB
8. ...
PentestBox: Penetration Testing Distribution for Windows
PentestBox is not like other Penetration Testing Distributions which runs on virtual machines. It is created because more than 50% of penetration testing distributions...
Most Read
LINUX GAME HACKING GUIDE 2021
In the past, most games had cheat codes, yet these days it's more uncommon. As a programmer, I like to perceive how things work,...
Phishing Prevention: How to Secure Your Organization Against Phishing Attacks
Phishing is a type of cyberattack that aims to trick people into giving up their sensitive information or hack into a system by means...
Automated Penetration Testing Prevents High-Risk Vulnerabilities
According to new research from Positive Technologies, a substantial 84% of companies contain high-risk vulnerabilities within their network perimeter. Scanning as many as 3,514...
Security Concerns When You’re Running Your Company From Abroad
The world of technology makes it possible for entrepreneurs to run their businesses from any location worldwide. You could travel and move to any...