Sub-domain enumeration techniques

What is Sub-domain enumeration? Sub-domain means Sub-division of domain. As a Penetration Tester most of...

Wps breaker | High Touch WPS Breaker

High Touch WPS Breaker is a small tool based on the bash script language. It can help you to extract the WPS...

How to crack windows password | Ophcrack

Ophcrack is a free Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by...

WordPress vulnerability version 4.9.6

WordPress exploit | Introducing WordPress New Vulnerabilities to Delete Sensitive Files and Reset WordPress, as well as Other Accessibility Google...

People Search Engine | OSINT

In this blog, I am sharing people search engine technique from Open source Intelligence. There are some open source search engine that...

UserRecon – Find usernames from social network

In this tutorial, I am sharing User reconnaissance tool. UserRecon merge 75 social networks, This is useful if you are running an...

Tweets analyzer in python

Tweet analyzer In this post I am going to share with you tweet analyzer that developed by x0rz....

Performing security testing of web applications Burp suit

Turbo Intruder is a Burp Suite extension for sending large numbers of HTTP requests and analyzing the results. It's intended to complement...

Top 10 SQLi tools 2018

SQLi stands for SQL injection. SQL injection often abbreviated SQLi and pronounced as SQLeye. It is a common web application vulnerability...

XERXES DDOS tool

What is DDOS attack?DDOS attack is generating unusual traffic to the webserver. It is basically DOS (Denial of service). It means...

Latest news