Home Web Security

Web Security

Top 10 Open Source Web Testing Tools

Web Testing tools are used to find/identify bugs or errors in a website before it was launched officially for the public on the web....

XSSYA – Cross Site Scripting Scanner & Vulnerability Confirmation

Cross-Site-Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted web sites. XSS attacks occur when an...

How to Evade getting Hacked during Online Shopping

Avoiding long lines and cranky crowds are just two of the benefits of online shopping. But getting hacked while buying a toy playset from...

100’s of Thousands WordPress Sites infected with Dangerous Malware

About 100,000 or more websites running the WordPress content management system have been compromised by mysterious malware that turns the infected sites into attack...

Weevely PHP Stealth Web Backdoor Kali Linux

Weevely is a stealth PHP web shell that simulate an SSH-like connection. It is an essential tool for web application post exploitation, and can be used...

Iron Web application Advanced Security testing Platform

IronWASP (Iron Web application Advanced Security testing Platform) is an open source system for web application vulnerability testing. It is designed to be customizable...

Facebook Sets up Hidden Service in Privacy push

Facebook has made it easier for those using the anonymizing browsing network Tor to access its services. The world's largest social network by users created...

Source Code Analyzer for PHP Vulnerabilities – RIPS

The World Wide Web grew rapidly during the last decades and is used by millions of people every day for online shopping, banking, networking, and...

WebApp Information Gatherer – WIG

Footprinting and information gathering, the first and most important step of penetration testing. To become a successful ethical hacker you need to implement every step and...

Top 10 Vulnerability Scanner

P { margin-bottom: 0.08in; } Vulnerability scanner is a software program that has been designed to find vulnerabilities on computer system, network and servers. In addition to...

Top 7 Firewalls for Windows

The best firewall for Windows will protect against incoming threats and be able to block outgoing threats from malware that has successfully infiltrated your system. A...

Web Application Firewall Detection – Kali Linux Tutorial

P { margin-bottom: 0.08in; } WAF or Web application firewall is a security tool that protects a website from various type of attacks which included but not...
- Advertisment -

Most Read

OSINT WIFI Tutorial: Track People using WiFi via Wigle

Due to the drastic growth of internet access, Wi-fi networks have become progressively popular. Wi-fi technologies link to the network topologies allows users to...

Why Attack Surface Analysis is a Core of Cybersecurity?

The pandemic of COVID-19 has changed the world dramatically. Almost all everyday actions have gone online: people work from home, students attend lectures through...

The Attack Surface Mapping guide for Ethical Hackers

This article explains how to map the attack surface in a precise and realistic way. An attack surface aims to figure out which areas...

Addressing Myths About Online Casinos & Security

Many people carry a perception that online casinos inherently involve a security risk. The sense is that these sites can be somehow “sketchy” or...