Posted in Application

IDA 7 Guide

In this post, I would like to talk about IDA 7 tools which are been used for reverse engineering application The tools have been developed…

Continue Reading...
Posted in Network

Nmap Tutorial

Nmap is a network analysis and security auditing tool which is free and open source. Nmap is used by Security Consultant as an initial reconnaissance…

Continue Reading...
Posted in Application

BlackEye Tool

BlackEye Tool is a Phishing Tool where it will duplicate exactly the same website such as Facebook, Google, Yahoo, Microsoft, Paypal, and so on. The…

Continue Reading...
Posted in Forensic

Forensic Tools – DG WINGMAN

Recently, Digital Guardian has launched a forensic tool called DG WingMan for security professionals that involved in Forensic Area As we all know, it’s important…

Continue Reading...
Posted in Application

ShellPhish

What is Phishing? Phishing is a method that been sent by the spammer to get details or information about the victims such as Name, Bank…

Continue Reading...
Posted in Application Tutorial

Exiftool

What is Exiftool? Exiftool is an open source tool that read, write and edit any meta related to Jpeg, Pdf, Audio, and Video. The purpose…

Continue Reading...
Posted in Network

Metasploit 5.0 Review

Metasploit 5.0 is already been release to the wild. Good news! It is a major improvement from the previous metasploit version. The new Metasploit 5.0…

Continue Reading...
Posted in Network

Network Assessment Tools

The common network assessment tools like Wireshark and Nmap can complete within the network or external network (remotely). The purpose of network assessment is to…

Continue Reading...
Posted in Network

Frida

Frida is a Dynamic toolkit for the developers, reverse-engineers, and security researchers to do mobile penetration testing Why choose Frida? ·       Script – Frida allows the attackers…

Continue Reading...
Posted in Application

Prowler – AWS Security Assessment tools

What is Prowler? During my research on how to do an security assessment on the cloud infrastructure, i stumble with Prowler tools which been write…

Continue Reading...