Category: Tools

13 Mar 2019

Mozilla has launched Firefox Send which is its free, end-to-end encrypted file-transfer service that enables the users to securely share large files like video, audio or photo files which cannot be normally sent as email attachment due to its large size. This service had made it easier for the users to share large files securely…

07 Mar 2019

Mozilla is soon to bring a new user anti-fingerprinting feature to Firefox in its latest version 67 which is scheduled for mid-May this year. The new technique known as letterboxing adds “gray spaces” to the sides of a web page when the user resizes the browser window, which are then gradually removed after the window…

07 Mar 2019

The National Security Agency released a free software reverse engineering tool called Ghidra which is useful for malware analysts and software engineers. The agency had been using this internally for more than a decade. At present, Ghidra is available for download only through its official website, and the NSA is planning to release its source…

02 Mar 2019

Adobe has released an emergency out-of-band update for its ColdFusion development platform to patch a zero-day vulnerability which was being exploited in the wild. According to Adobe the vulnerability is described as a “file upload restriction bypass” and was given the severity critical. The attack involves uploading executable code to a web-accessible directory, and then…

25 Oct 2018

Let us take a look at some of the top Cyber security tools used to find the vulnerable systems and protect your privacy. Cyber security and IT security is the protection of internet connected systems included hardware, software or electronic data from theft, damage, disruption or misdirection of the services they do. Most of the…

22 Oct 2018
The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. Metasploit is best known as Framework, where user can build their own tools for finding exploits in applications, Operating system and networks. A tool for developing and executing exploit code against a remote...
11 Jun 2018

Wifite is created to attack multiple WEP and WPA encrypted networks at the same time. This tool is customizable to be automated with only a few arguments and can be trusted to run without supervision. It’s a great tool to script into part of a toolkit for Wifi security assessments and is a handy wifi…

05 Feb 2018

Linux System Optimizer And Monitoring. Required Packages curl systemd Debian x64 Download stacer_1.0.8_amd64.deb from the Stacer releases page. Run sudo dpkg -i stacer*.deb on the downloaded package. Launch Stacer using the installed stacer command. Fedora x64 Download stacer_1.0.8_x64.rpm from the Stacer releases page. Run sudo rpm –install stacer*.rpm on the downloaded package. Launch Stacer using the installed stacer command. Build from source with CMake (Qt Version Qt 5.9) $…

20 Dec 2017
Wazuh helps you to gain deeper security visibility into your infrastructure by monitoring hosts at an operating system and application level. This solution, based on lightweight multi-platform agents, provides the following capabilities: Log management and analysis: Wazuh agents read operating system and application logs, and securely forward them to a central manager for rule-based analysis and storage. File integrity monitoring: Wazuh...
18 Dec 2017
InSpy is a python based LinkedIn enumeration tool. Inspy has two functionalities: TechSpy and EmpSpy. TechSpy - Crawls LinkedIn job listings for technlogoies used by the provided company. InSpy attempts to identify technologies by matching job descriptions to keywords from a new line delimited file. EmpSpy - Crawls LinkedIn for employees working at the provided company. InSpy...