Browsing category

Uncategorized

PTF – Penetration Testers Framework

The PenTesters Framework (PTF) is a Python script designed for Debian/Ubuntu/ArchLinux based distributions to create a similar and familiar distribution for Penetration Testing. As pentesters, we’ve been accustom to the /pentest/ directories or our own toolsets that we want to keep up-to-date all of the time. We have those “go to” tools that we use […]

Firefox Privacy – The Complete How-To Guide

Mozilla Firefox is arguably the best browser available that combines strong privacy protection features, good security, active development, and regular updates. The newest version of Firefox is fast, light-weight, and packed full of great settings to protect your privacy. It is for this reason that I consider Firefox to be the best all-around browser for […]

Microsoft Research Detours Package

Detours is a software package for monitoring and instrumenting API calls on Windows. Detours has been used by many ISVs and is also used by product teams at Microsoft. Detours is now available under a standard open source license (MIT). This simplifies licensing for programmers using Detours and allows the community to support Detours using […]

Mercury – Multiple Hacking Tools collection

Mercury is a hacking tool used to collect information and use the information to further hurt the target. Main Menu Installation Requires Python2 (Linux) apt-get install python2 git clone https://www.github.com/MetaChar/Mercury pip install -r requirements.txt Features BruteForce Mercury uses Selenium to automatically input passwords into a website GeoLocation Gelocation allows the user to pin point the […]

25 BEST RAINMETER SKINS FOR 2018

Several people can be confused upon deciding what to use and which Rainmeter skin to land on, out of hundreds of skins available. So to ease things out, we have listed 25 best Rainmeter skins for 2018 25 BEST RAINMETER SKINS FOR 2018 1. NEWSPAPER DESKTOP. Newspaper Desktop is an amazing skin for old school […]

Web Server Penetration Testing Checklist

“Conduct a serial of methodical and repeatable tests”  is the best way to test the web server along with this to work through all of the different application vulnerabilities. “Collecting as Much as Information” about an organization Ranging from operation environment is the main area to concentrate on the initial stage of web server Pentesting. Performing […]

Penetration Testing Checklist

Network Penetration Testing determines vulnerabilities in the network posture by discovering Open ports, Troubleshooting live systems, services and grabbing system banners. The pen-testing helps administrator to close unused ports, additional services, Hide or Customize banners, Troubleshooting services and to calibrate firewall rules.You should test in all ways to guarantee there is no security loophole. Let’s see […]

Helios 4 NAS – Worlds First Open Source Personal Cloud 2017

Cloud file sharing provides end users with the ability to access files with any Internet-capable device from any location. But when larger files are shared over the internet, it becomes really slow and frustrating. Behold “The Helios 4 NAS” Helios 4 is a network attached storage Or NAS. It is basically a single board computer […]