Centralized Firewall Control script CFC : To Manage The Firewall On Multiple Servers It supports both IPv4 and IPv6. Tested on Deb... Read more »
- Latest Post
More Headlines
Understanding Meltdown And Spectre - What To Know About New Exploits That Affect Virtually All CPUs
Understanding Meltdown & Spectre - What To Know About New Exploits That Affect Virtually All CPUs Security researchers... Read more »
PiDense- To Monitor Fake Access Points of Wireless Network Activities
PiDense- Monitor illegal wireless network activities. (Fake Access Points) Purpose Monitor illegal wireless network activities. ... Read more »
What is Cyber-Insurance and Why Your Company Needs It?
WHAT IS CYBER-INSURANCE AND WHY YOUR COMPANY NEEDS IT? With threats аnd аttасkѕ іnсrеаѕіng lіkе nеvеr before, іt іѕ hard tо bе sure of... Read more »
How Much Can You Earn As An Ethical Hacker?
How Much can you Earn as an Ethical Hacker? The rise of ethical hacking and a simultaneous boom in cybersecurity awareness now me... Read more »
Lenovo Machines Vulnerable To Bypass Fingerprint Scanner
Lenovo Machines Vulnerable To Bypass Fingerprint Scanner . A Fingerprint vulnerability exists in Lenovo systems. If you have older v... Read more »
Domain Analyzer: To Analyze Security of Any Domain By Finding All The Information Possible
Domain Analyzer: To Analyze security of any domain by finding all the information possible. The code created in python. Domain analy... Read more »
Archery: The Open Source Vulnerability Assessment And Management For CyberSecurity Researchers
Archery: Open Source Vulnerability Assessment and Management For CyberSecurity Researchers. Archery helps developers and pentesters ... Read more »
OWASP Nettacker- Automated Penetration Testing Framework
OWASP Nettacker- Automated Penetration Testing Framework OWASP Nettacker is an open source software in Python language which lets yo... Read more »
How to Use VPNs To Get the Best Out of Blockchain
How to Use VPNs to Get the Best Out of Blockchain In 2017, there was a surge in the use and development of blockchain technology. ... Read more »
Wi-Fi Allowance Announces WPA3 Protocol For More Security Protections
New Wireless Protocol WPA3 To Get More Wireless Security After 14 years, WPA3 New Wireless Protocol Coming To Get Wi-Fi network Sec... Read more »
PiKarma- To Detects Wireless Network Attack
Detects wireless network attacks performed by KARMA module It Detects wireless network attacks performed by KARMA module (fake AP). ... Read more »