Here you will find privilege escalation tools for Windows and Linux/Unix* (in some near future also for Mac).These tools search …
Discovering Vulnerabilities Through Penetration Testing: What You Need to Know
Are you thinking of conducting penetration testing to discover your IT network’s security vulnerabilities? If you are, then you need …
Polyshell – A Bash/Batch/PowerShell Polyglot!
PolyShell is a script that’s simultaneously valid in Bash, Windows Batch, and PowerShell (i.e. a polyglot).This makes PolyShell a useful …
HomePwn – Swiss Army Knife for Pentesting of IoT Devices
HomePwn is a framework that provides features to audit and pentesting devices that company employees can use in their day-to-day …
JSONBee – A Ready To Use JSONP Endpoints/Payloads To Help Bypass Content Security Policy Of Different Websites
A ready to use JSONP endpoints to help bypass content security policy of different websites.The tool was presented during HackIT …
Tails 4.0 – Live System to Preserve Your Privacy and Anonymity
Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet …
Tor Browser v9.0 – Everything you Need to Safely Browse the Internet
Tor Browser 9.0 is the first stable release based on Firefox 68 ESR and contains a number of updates to …
An Ultimate Checklist for Application Security Testing
According to a report by MarketsandMarkets, “The application security Testing market is expected to grow from USD 2.79 Billion in …
Converting Your Android Smartphone into Penetration Testing Device
Big corporations trying to improve the user experience by making everything around simplify, increasing performance and connections with “IoT’s”. Today …
Complete Ethical Hacking and Penetration Testing Course Bundle – Become a Professional Ethical Hacker
Today we want to introduce you to the “Complete Ethical Hacking and Penetration Testing Course A to Z Bundle with …