Take the Online Safety Quiz 2017

Part of Safer Internet Day, this Online Quiz invites children, young people, parents, grandparents and teachers to create a better internet together by exploring what to do in different situations that may arise…

Read more

Sniff HTTPS/FTP Packets using SSLSTRIP and DSNIFF – ARP Spoofing MITM Attack

As per Wikipedia source, In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each…

Read more

Install Monit, a process and service monitoring tool on Kali Linux

Monit is a small Open Source utility for managing and monitoring Unix systems. Monit conducts automatic maintenance and repair and can execute meaningful causal actions in error situations. Monit package is easily available…

Read more

HTML – Questions With Answers – 176 to 200 Questions – SET 8

Q176. Why should you avoid using background images in tables in HTML e-mail? Answer – You should avoid using background images in tables in HTML e-mail because Outlook 2007 does not support them….

Read more

How to use Touch command effectively in Kali Linux

As you all knows Touch command is used to create a quick file of any extension. Touch command can be used to modify the access/modification timestamps of files. You can even create a…

Read more

Spaghetti – Web App Security Scanner Tool [Installation + Usage]

Spaghetti is a web application security scanner tool. It is designed to find various default and insecure files, configurations and misconfigurations. Spaghetti is built on python2.7 and can run on any platform which…

Read more

6 Things to do after installing Kali Linux

Kali Linux is one of the most popular open source penetration testing distribution operating system having more than 600+ hacking/testing tools pre-installed in it. It is maintained and funded by Offensive Security Ltd….

Read more

Creating an undetectable payload using Veil-Evasion Toolkit

In previous tutorials, we used msfvenom for generating various payloads but now a days AV companies coded a signature for the templates these schemes uses so to bypass AV, today we’ll use another…

Read more

HBO agreed to pay $250,000 as a ransom but Hackers denied to accept

Last month, the HBO hackers claimed that, they’ve stole around 1.5TB of data from HBO which includes the upcoming episodes of “Ballers” and “Room 104” and a script of 4th episode of “Game…

Read more

Testing all SSL Vulnerabilities with TestSSL Script

testssl.sh is pretty much portable/compatible. It is working on every Linux, Mac OS X, FreeBSD distribution, on MSYS2/Cygwin (slow). testssl.sh is a free command line tool which checks a server’s service on any…

Read more

Top 65 OWASP Cheat Sheet Collections – ALL IN ONE

A cheat sheet is a concise set of notes used for quick reference. The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific web application…

Read more

Super Nintendo Entertainment System – The Best 15 Games to Remember the Childhood

After the release of the 8-bit Nintendo Family Computer (Famicom) console in Japan in the summer of 1983, which was cheaper than the Sega and Atari consoles and allowed to download the game…

Read more

Arrest Mystery of Marcus Hutchins – a WannaCry Hero

For the last few weeks Marcus Hutchins has been in Las Vegas attending a security conference, and on holiday. On Wednesday he was arrested on the flight home due to an indictment made…

Read more

Welcome to “Send.firefox.com” a test experiment by Mozilla

Mozilla just launched a file sharing site named as “Send.firefox.com” through which you can easily send a file from one person to another. Basically its a file sharing experiment which allows you to…

Read more

How to use Netcat for Listening, Banner Grabbing and Transferring Files

Netcat is one of those few tools like nmap, Metasploit, Wireshark and few others that every hacker should be familiar with. It is simple, elegant and has a multitude of uses. For instance,…

Read more

MSFVENOM – All payload examples – Cheatsheet 2017

Msfvenom is a Metasploit Standalone Payload Generator which is a replacement of msfpayload and msfencode. Through msfvenom, you can generate any kind of shellcode/payload depending upon the platform/OS you want to hack. Often…

Read more

Meterpreter Useful Top 60 Commands List – 2017 Update

Meterpreter is an advanced, dynamically extensible payload that uses in-memory DLL injection stagers and is extended over the network at runtime. It communicates over the stager socket and provides a comprehensive client-side Ruby…

Read more

Androwarn – An open source APK static code analyzer

Androwarn is one of the most popular static code analyzer for malicious android applications whose main aim is to detect and warn the user about potential malicious behaviours. Features of Androwarn – Structural…

Read more

Top 7 Online Android APK Malware analyzers – FREE

Last week, we discussed about android apk backdooring with msfvenom and metasploit framework. Android is a Linux kernel mobile platform. Android runs on a wide range of devices, from mobile smartphones and tablets,…

Read more

OS Detection using Metasploit Framework

In previous article, we identified the name of the operating system using Ping command. But today we’ll show you that how you can identify the OS using one and only one post exploitation…

Read more

Penetration Testing Quick Cheatsheet v1.0 – 2017

Penetration testing (also called pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit. Here we’re listing out the quick cheatsheet…

Read more