GOSINT: A Framework for Collecting, Processing, and Exporting Indicators of Compromise (IoC)
Tools are an important mechanism for any professional wanting to simplify their work and be more productive. As a chef might use a whisk to beat eggs faster and prepare more food in less time, information security professionals also depend on tools to make their work easier and quicker to complete.
Jok3r: A Framework for Automated Network and Web Penetration Testing
The use of tools is important in every industry. Finance professionals use spreadsheets and graphing tools to gather and visualize data. Software developers use a wide range of tools to create websites and applications.
Top 5 Nmap Online Alternatives
While working with a terminal on Unix or Linux can feel like the better part of driving a manual car, with the vehicle’s full power in your hands and the sense you get of old-fashioned control, some people prefer the automatic variety. These people want an easier experience, with something that simply “works” while doing much of the work for you.
Top 8 Exploit Databases for Security Researchers
Vulnerabilities are found every day, and they don’t discriminate from one operating system to another. They’re present on all operating systems used on electronic devices, from mobile phones to smart TVs, from the IoT to computers.
Top 15 OSINT Web Browser Extensions
OSINT stands for Open Source Intelligence, as explained in our previous article What is OSINT? At that time, we learned about the concept of OSINT, how to make use of it, and its most popular techniques.
The Social Engineering Toolkit
In the cybersecurity world, there are many types of attacks and network threats. And among the most popular are social engineering attacks.
Open Port Checker Tools
We talk a lot about port scanning tools in this blog. That’s because they play a critical role in the cybersecurity industry.
Flan Scan - The New Vulnerability Scanner from Cloudflare
Port scanning is one of the most frequent activities performed by security researchers working as part of a red team. And in other scenarios, blue teams use it along with online vulnerability scanning tools to prevent a security breach in their apps and servers. Knowing that port and vulnerability scanners are pillars of the cybersecurity world, we’ll analyze one of the newest today, Flan Scan. How new is it? This vulnerability scanner was released only days ago.
Nmap Scripts (NSE): The Key To Enhance Your Network Scans
Nmap is, quite simply, the best port scanner around. We love it because it offers easy installation, simple usage syntax and great results, as we previously explored in our Nmap commands article. For those who aren’t familiar with it, Nmap isn’t just a common tool we all use for port scanning IP ranges from time to time—it offers much more than that. So if you really want to boost your Nmap scanning capabilities, keep reading. Today we’ll take a close look at the Nmap Scripting Engine, known as NSE.
Top 12 Vulnerable Websites for Penetration Testing and Ethical Hacking Training
The infamous cybersecurity skills gap is rising, and more than ever, companies are in need of security professionals to protect their networks and systems. So whether you’re just starting out in cybersecurity or you’re established as an expert, you constantly need to work on practising and sharpening your hacking skills.