In this post, i would like to share one attack method that will take advantage on QR Code which called Quick Response Code Login Jacking (QRLJacking). QRLJacking is a new […]

Autopsy Forensic Tools Review

In this post, I would like to share what I have gained during the training which might help people out there. A couple of weeks ago, I attend online and […]

WebDav Review

In this post, I would like to talk about DavTest tools which can be found in Kali Linux. Before we go deeper into using DAVTest, we need to know about […]

Zone Transfer Security

Let’s start discuss Zone Transfer Security on this post. For those who are not familiar with DNS Zone Transfer, it is a process in which any DNS Server IP has […]

PhoneSploit Android Mobile Debug Tool

PhoneSploit is a new tool that would be exploiting Android Mobile Devices by using Android Debug Bridge (ADB). The tools can be running within the Windows Operating System and Linux […]

Pentest Tool Framework

Pentest Tools Framework is a Penetration Testing tool that uses several exploits database with scanners. The interface looks identical to Metasploit with a simple type of UI/UX design for beginner […]

Yara Tools Usage

Malware Researchers will use the tool YARA in terms of helping them to identify and classify any sample of the malware used. Normally, Malware Researchers will able to create any […]

Radare2 – Reverse Engineering Tools

For those who have experience in with Reverse Engineering Method, they should be familiar with Radare2 Tools where it will provide a set of libraries and also work with binary […]

Network Security Assessment tools

As we know, Network Security can be considered as one of the assessment when doing Penetration Testing. Another name of Network Security Assessment is called Vulnerability Assessment(VA). The Assessment should […]

Wfuzz review

Wfuzz is an alternative tools for Gobuster and Dirbuster where it will look on the hidden files such as directory and data within the server itself. Unlike Gobuster and Dirbuster, […]