Search Results for: Kali Blog Post Missing SPARTA in latest Kali Linux 2020.1? Try LEGION! April 28, 2020 Popular open-source tool Sparta is no longer available in Kali Linux because of unsupported Python version. Tools depending on Python... Blog Post Zenmap installation guide – Kali Linux 2019.4 January 14, 2020 Zenmap is a cross-platform GUI (Graphical User Interface) for Nmap. This open-source tool is designed to make Nmap easy for... Blog Post OffSec Releases Win-KeX 2.0 with Exciting New Features October 7, 2020 Win-KeX is a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). It allows users to run Kali Linux... Blog Post What is black box Pentesting? October 28, 2020 Organizations implement a broad range of security measures to maintain a sound security posture. These security measures can be either... Blog Post EyeWitness – Capture Screenshots of Any Website March 12, 2020 EyeWitness is an open-source tool, designed to take screenshots of the web pages from a file. This tool can parse... Blog Post SQLMAP – Authenticate via NTLM under Windows March 19, 2020 Sqlmap is a powerful open-source tool for automating the process of detecting and exploiting SQL injection flaws. It comes preinstalled... Blog Post Current Tools and Techniques in Digital Forensics February 17, 2021 Digital forensics leverages specialized techniques and tools to investigate various forms of computer-related crimes. Digital crimes may include network intrusion,... Blog Post Open Source and Free Tools for Incident Response Teams November 26, 2019 LIFARS Incident and Response team uses multiple tools when responding to and investigating incidents. For new and upcoming enthusiasts and... Blog Post What is Penetration Testing? February 6, 2019 Penetration testing is an interesting subsection of cyber security. Where many areas of cyber security focus on defending networks, penetration... Blog Post How to Recover Files by Removing the CryptoLocker Ransomware November 2, 2015 The Cryptolocker ransomware is a malware strain that has evolved over the years and has repeatedly proven to be a... Blog Post The "nogotofail" Network Security Testing Tool by Google Released November 6, 2014 Is your TLS/SSL communication secure? Use nogotofail to find out. Blog Post A New Android App that Turns Your Smartphone into a Hacking Tool September 27, 2014 A new tool has surfaced on the web that can turn your Nexus Android phone into practically a Swiss Army knife. Blog Post A New Linux Distribution Announced…by The Syrian Electronic Army! October 13, 2014 The Syrian Electronic Army, an infamous group of Syrian hackers in support of the Bashar al-Assad government regime, announced via...
Blog Post Missing SPARTA in latest Kali Linux 2020.1? Try LEGION! April 28, 2020 Popular open-source tool Sparta is no longer available in Kali Linux because of unsupported Python version. Tools depending on Python...
Blog Post Zenmap installation guide – Kali Linux 2019.4 January 14, 2020 Zenmap is a cross-platform GUI (Graphical User Interface) for Nmap. This open-source tool is designed to make Nmap easy for...
Blog Post OffSec Releases Win-KeX 2.0 with Exciting New Features October 7, 2020 Win-KeX is a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). It allows users to run Kali Linux...
Blog Post What is black box Pentesting? October 28, 2020 Organizations implement a broad range of security measures to maintain a sound security posture. These security measures can be either...
Blog Post EyeWitness – Capture Screenshots of Any Website March 12, 2020 EyeWitness is an open-source tool, designed to take screenshots of the web pages from a file. This tool can parse...
Blog Post SQLMAP – Authenticate via NTLM under Windows March 19, 2020 Sqlmap is a powerful open-source tool for automating the process of detecting and exploiting SQL injection flaws. It comes preinstalled...
Blog Post Current Tools and Techniques in Digital Forensics February 17, 2021 Digital forensics leverages specialized techniques and tools to investigate various forms of computer-related crimes. Digital crimes may include network intrusion,...
Blog Post Open Source and Free Tools for Incident Response Teams November 26, 2019 LIFARS Incident and Response team uses multiple tools when responding to and investigating incidents. For new and upcoming enthusiasts and...
Blog Post What is Penetration Testing? February 6, 2019 Penetration testing is an interesting subsection of cyber security. Where many areas of cyber security focus on defending networks, penetration...
Blog Post How to Recover Files by Removing the CryptoLocker Ransomware November 2, 2015 The Cryptolocker ransomware is a malware strain that has evolved over the years and has repeatedly proven to be a...
Blog Post The "nogotofail" Network Security Testing Tool by Google Released November 6, 2014 Is your TLS/SSL communication secure? Use nogotofail to find out.
Blog Post A New Android App that Turns Your Smartphone into a Hacking Tool September 27, 2014 A new tool has surfaced on the web that can turn your Nexus Android phone into practically a Swiss Army knife.
Blog Post A New Linux Distribution Announced…by The Syrian Electronic Army! October 13, 2014 The Syrian Electronic Army, an infamous group of Syrian hackers in support of the Bashar al-Assad government regime, announced via...