full screen background image

Archives post

Analysis of Malicious Documents- Part 5

In the last article, we reviewed how to analyze malicious PDF documents. In this last part of the article series, we will continue...

Proteus: 1 – CTF Walkthrough

Proteus is a relatively new machine that came on VulnHub. Created by Ivanvza, it surfaced on June 7th, 2017. It can be downloaded from...

Microsoft Office Dynamic Data Exchange(DDE) attacks

Microsoft Office programs are widely exploited by malware authors by embedding links, objects, and other payloads. Its effects often depend...

The Complete Guide to IT Security Salaries in 2017

With 96% of HR managers now using IT certifications as screening or hiring criteria during recruitment, getting certified is an essential...

APs_Beacon – With this script you can spam WiFi APs/Hotspots

With this script you can spam WiFi APs. How to run it? Download “APs_Beacon.sh” and “SSID_List.txt” or type “git clone...

BlackOrphan – Tool built with Bash/nodeJs mainly for gaining a remote shell access to a Linux Box

BlackOrphan is a tool built with Bash/nodeJs mainly for gaining a remote shell access to a Linux Box BlackOrphan is a tool built with...

Linux Soft Exploit Suggester – Search Exploitable Software On Linux

linux-soft-exploit-suggester finds exploits for all vulnerable software in a system helping with the privilege escalation. It focuses on...

10 Tips for CCNA Certification Exam Success

Getting ready to take the CCNA/CCENT/CCDA/CCNA Security certification exam? We asked InfoSec Institute professors and industry experts to...

pcc – PHP Secure Configuration Checker

Check current PHP configuration for potential security flaws. Simply access this file from your webserver or run on CLI. Author This...

KRACK Detector – Detect and prevent KRACK attacks in your network

  KRACK Detector is a Python script to detect possible KRACK attacks against client devices on your network. The script is meant to be...