How to Enable Self-Signed Certificates for Local Apache Webserver – LINUX

This article describe how to quickly enable SSL for local apache web server under Linux. This has been done on a Kali Linux virtual machine of version 2018.1, the one maintained and funded…

Read more

How To Decode Base64 In Most Popular Programming Languages

Base64 is a group of similar binary-to-text encoding schemes that represents binary data in an ASCII string format by translating it into radix-64 representation. All examples below uses base64 decoded text (eWVhaGh1Yg==) for…

Read more

A to Z Programming Notes – By GoalKicker.com

Are you looking for the Best Free Programming eBooks on PHP, Python, Ruby, Java etc? Choose from over 40+ eBooks for Free! Read and Download eBooks for Free: anytime with GoalKicker.com! Most of…

Read more

Top 23 Android Static Analysis Tools – 2018 Compilation

Traditional attacks like phishing, and newer twists like vishing, also impact mobile security. Mobile media adoption is huge when it comes to “texting” with others, not to mention brief phone calls and e-mails to friends…

Read more

Top 14 Online APK Analyzers for Android – 2018 Compilation

Last year, Google itself launched Google Play Protect Service which provides an extra layer of security to all users. Although the problem is not fully solved because of risk still exists. NOTE: It…

Read more

Tips and Tricks For Outreach: Small Details That Will Warm Up Your Leads

Why is it important to reach out to many people? What are you doing to warm up your leads? Have you seen what your competitors are doing? You are asking the same questions,…

Read more

Online Port Scanning – Top 5 Resources

In the context of penetration testing, Port Scanning is usually performed to identify open ports against any target machine. Open ports correspond to the networked services that are running on a system. Programming…

Read more

6 Linux Distributions For Forensics Investigation

Over the past 2-3 years, we’ve seen a dramatic increase in sophisticated attacks against organizations. Cyber attacks originating from China, named the APT (Advanced Persistent Threat), have proved difficult to supress. Financial attacks…

Read more

OSINT Resources List 2018 Compilation – Exploits & Vulnerabilities Search

OSINT framework focused on gathering information from free tools or resources. The intention is to help people find free OSINT resources. Some of the sites included might require registration or offer more data…

Read more

Top 10 Online Free Scanners

Throughout the scanning phase, penetration testers and ethical hackers gather very useful information about the target environment that will be critical in the ongoing stages of a test. Scanning and identifying vulnerabilities is…

Read more

Top 30 Basic NMAP Commands for Beginners

Nmap is a free tool that can be used to conduct various sorts of scans on networks. Normally, when people think of Nmap, they assume it’s used to conduct some sort of nefarious…

Read more

Get Linux IP Address from Command Line – 5 Ways

What is IP Address –  A unique number consisting of four parts separated by dots. Every device on the Internet (and on any network) must have a unique IP address to participate and…

Read more

TCPDUMP: 25 Common Command Examples

Tcpdump is a well known command line packet analyzer tool. Using tcpdump command we can capture the live TCP/IP packets and these packets can also be saved to a file (pcap). Later on…

Read more

6 Things to Remember Before Using a Dating App

The communication has become much easier with the development of the internet and numerous applications. Despite their simplicity, there are numerous tricks and nuances you should consider before using them and is especially…

Read more

Best Free Contact Form Plugins for WordPress

Essential for any website, a contact form is one of the first things to think about for your project. It is important to give your users a voice, to understand their needs and…

Read more

4 Ways To Protect Your MyBB Forums

MyBB is one of the most widely used open source, intuitive, extensible, and incredibly Forum software out there. The software is recognized for its security as well as it is the most secure…

Read more

Top 5 Hacking Tools – Blacklisted By US-CERT (HIGH ALERT)

The hacking tools mentioned in the US-CERT Report may not be unfamiliar to the security researchers and penetration testers, but the value for the enterprise security defense workers is self-evident. Research is designed…

Read more

15 Essential Meterpreter Commands Everyone Should Know

A meterpreter is an advanced, stealthy, multifaceted, and dynamically extensible payload which operates by injecting reflective DLL into a target memory. Scripts and plugins can be dynamically loaded at runtime for the purpose of extending…

Read more

15 Most Useful Host Scanning Commands – Kali Linux

Discovery tools are used to gather information about a target network or system. The tools enable you to easily perform many otherwise manual processes, such as whois queries, DNS zone transfers, SNMP queries,…

Read more

Seven ways to kill it with social media marketing

Digital marketing has come a long way since the prominence of social media as a powerful tool in the practice of marketing. With so many people online to target with different products, the…

Read more

Top 15 IT Security Interview Questions For Infosec

There are certain requirements that you must meet in order to be an effective penetration tester in a infosec job role. The requirements deal with your level of security skills, your systems and…

Read more