Home Pen-Testing

Pen-Testing

Ethical Hacking and Penetration Testing Using Kali Linux

Kali Linux is the world’s best known operating system for ethical hacking purposes. It is developed by Offensive security as the rewrite of BackTrack....

APT2: Automated Penetration Toolkit

Automated Penetration Toolkit can perform an NMap scan and import the scan results from Nexpose, Nessus and other scanning tools. The results are further...

OWTF: OWASP Offensive Web Testing Framework

OWTF is OWASP’s (Open Web Application Security Project) Offensive Web Testing Framework. This tool automates the manual and un-creative part of pen-testing. OWASP’s project...

Top 10 Web Application Vulnerability Scanners

A web vulnerability scanner is a program which works on a web application in order to discover potential security vulnerabilities and architectural flaws. It...

Hacking MongoDB (NOSQL) training for Pentesters

MongoDB (aka NOSQL) seems a secure database, but there is no security and don’t forget the height of human stupidity. EH Academy announces the...

Why Automation is important in Web Application Security Assessment?

The importance of vulnerability assessment is the unearth fact and nobody can’t deny it. The technology has revolved in the recent years, the world...

Next-gen BurpSuite Penetration Testing Tool

Welcome to the next generation of web application penetration testing - using WebKit to own the web. BurpKit is a BurpSuite plugin which helps in...

Discover: Automate Penetration Testing Tasks

git clone git://github.com/leebaird/discover.git /opt/discover/ All scripts must be ran from this location. cd /opt/discover/ ./setup.sh ./discover.sh RECON 1.  Domain 2.  Person 3.  Parse salesforce SCANNING 4.  Generate target list 5.  CIDR 6.  List 7.  IP or domain WEB 8. ...

PentestBox: Penetration Testing Distribution for Windows

PentestBox is not like other Penetration Testing Distributions which runs on virtual machines. It is created because more than 50% of penetration testing distributions...

Parrot Security OS for Pentesting and Computer Forensics

Parrot Security OS is a security oriented operating system designed for Pentesting, Computer Forensic, Reverse engineering, Hacking, Cloud pentesting, privacy/anonimity and cryptography. Based on...

Onapsis Bizploit – ERP & SAP Penetration Testing

Have you ever think about the vulnerabilities in your ERP and SAP system? If not then you and your organization are at risk. We...

Android Pentesting Portable Integrated Environment: Appie

Appie is a software package that has been pre-configured to function as an Android Pentesting Environment. It is completely portable and can be carried on...
- Advertisment -

Most Read

Top 5 Techniques Hackers Use to hack Social Media Accounts

These days, Social Media have become a significant need in our everyday life. It encourages us to associate and connect with anyone over the...

5 Top Programming Languages for Hacking

We live in the 21st century, which is very fast-changing. This is a century of competition for information and computing resources. Every year the...

OSINT Tutorial to Track An Aircraft And Flight Information In Real-Time

No doubt Internet is said to be the world's largest repository of data and information. It contains an enormous amount of data related to...

Preventing SQL Injection in PHP Applications

SQL injection is one of the most common cybersecurity threats and as the name suggests, it is a form of injection attack. Injection attacks, on...