Sniffnet – Network Monitoring
What is Sniffnet? Sniffnet is a free and open-source application for Linux, macOS, and Windows. It is a network monitoring…
How do Hackers Bypass Antivirus Protection?
Alert This is article only for educational purposes! × Dismiss this alert. What is Merlin? Merlin is an HTTP/2 Command…
Shodan.io: The Search Engine for the Internet of Things
What is Shodan.io? Shodan.io is a search engine for internet-connected devices. It is also known as the “search engine for…
Secure and Insecure Cryptographic Algorithms
What are Cryptographic Algorithms? Cryptographic algorithms are mathematical procedures used to perform cryptographic operations, such as encryption, decryption, and digital…
5 Best Scanners for Penetration Testing
1. Nmap Nmap is a free and open-source network scanner that can be used for a variety of purposes, including:…
Fuzzing | Introduction to Software Testing
What is Fuzzing? Fuzzing, or fuzz testing, is a software testing technique that provides invalid, unexpected, or random data as…
Exploiting XSS in hidden input fields and meta tags
In this post we are going to show how you can (ab)use the new HTML popup functionality in Chrome to…
Kaspersky Lab discovered a backdoor
Experts from the company have reported that a malicious campaign using Free Download Manager lasted for over three years. During…
Katana | Web Application Security Scanner
Katana is an open-source web application security scanner that automates the process of identifying vulnerabilities in web applications. It was created…
How to Protect Yourself from Juice Jacking
What is Juice Jacking? Juice Jacking is an attack that occurs when an attacker gains unauthorized access to your device’s…