WEB APPLICATION FIREWALL BASICS:- WAF (Web application firewalls) plays an important role in securing the websites. As they filter/monitor the traffic. Web...
INTRODUCTION:- In this digital era, our information is more public than private. The massive growth of internet users is increasing day by...
XSS-Shell Intro:- XSS Shell framework uses cross-site scripting to get reverse shell. In order to attack on the victim’s web browser you...
Trape Intro:- Trape is a OSINT (Open Source Intelligence Tool) is a tracking tool in which you can execute social engineering attack in...
CRUNCH INTRO:- While cracking the password, attacker always needs an wordlist. Normally, wordlist use thousand of words per second to crack the...
As per ethical hacking professionals, Nbtstat is a network tool that is used to check the running TCP/IP connections. Nbtstat list all...
JOHN THE RIPPER:- John the ripper is a password cracker tool, which try to detect weak passwords. John the ripper can run...
BABYSPLOIT INTRO:- Babysploit is a pentesting tool kit used in initial phase of pentesting. BabySploit mostly covers each and every scan. This...
Recon-ng is a tool written in python mostly used in information gathering with its independent modules, keys list and other modules. This...
WHAT IS A DNS (DOMAIN NAME SERVER)?Domain Name Server or we can say Domain Name System is a distributed method that helps...
MASSBLEED:- Massbleed is a SSL vulnerability scanner. Its mainly check vulnerability in ssl of the target sites, as per ethical hacking investigators....
Domain Name Server or we can say Domain Name System is a distributed method that helps humans to remember name of any...
FIERCE DNS SCANNER:- Fierce is a another domain scanner. It is written by Robert Hansen aka RSnake. It helps to locate non-contiguous...
TOR EXIT RELAY SCANNER:- As we all know tor is used for anonymous communication in anonymity network. Exitmap modules implement tasks that...
EVADE USING PROXYCHAINS:- Whenever attacker attacks in any network, all traffic of the attacker can be logged which can reveal the identity...
WHATWEB:- Whatweb is a next generation information scanner. Its name speaks “what is that website”. According to ethical hacking expert of International Institute...
AUTOMATER:- Automater is a tool to analyze URL, IP, MD5 hash for intrusion analysis. Automater scans the given target by using the...
NETBIOS ENUMERATOR:- Netbios was suggested that how to use remote network support. Netbios enumerator basically scans the range of IP addresses that...
Joomscan is a web vulnerability scanner used to detect command execution, sql injection and other web application attacks. As name suggest, joomscan...
TWOFI:- Twofi was written by Robin Wood at DigNinja. This tool can use to grab the contents of the user’s or company’s...
DATASPLOIT:- Datasploit is a tool used in footprinting a target or defending target. It allows you to collect relevant information about the...