Home » Archive by category Security

The Ultimate Guide to Open Source Monitoring Tools

In today’s fast-paced digital world, monitoring the performance and health of your systems is crucial to ensure smooth operations and prevent downtime. Open source monitoring tools have gained popularity for their flexibility, cost-effectiveness, and robust features. In this comprehensive guide, we will explore the best open source monitoring...
Continue reading

The OSI Model

The Open Systems Interconnect (OSI) model describes how networks communicate. It describes the various protocols and activities and states how the protocols and activities relate to each other. This OSI model is divided into seven layers. It was originally developed by the International Organisation for Standardization (ISO) in...
Continue reading

Commando VM 2.0

Commando VM 2.0, a new version of Windows-based security distribution released for penetration testing community The current version of Commando VM 2.0 received major changes including, the fixes of 61 bugs and added 26 new tools with three major new features and more. In order to install software,...
Continue reading

The Dark Web And How To Access It

Contents What’s the dark web How to access the dark web Installation of TOR browser – Windows and Kali Finding onion websites Dark Web What is the dark web In short, dark web is part of the web which requires special software to browse, and isn’t indexed by...
Continue reading

Next-gen BurpSuite Penetration Testing Tool

Welcome to the next generation of web application penetration testing – using WebKit to own the web. BurpKit is a BurpSuite plugin which helps in assessing complex web apps that render the contents of their pages dynamically. It also provides a bi-directional JavaScript bridge API which allows users...
Continue reading

Top 10 Web Application Vulnerability Scanners

  A web vulnerability scanner is a program which works on a web application in order to discover potential security vulnerabilities and architectural flaws. It performs a black-box test, no source code is reviewed. As web applications are widely used now days, performing many businesses around the world....
Continue reading

Website Hacking With CSRF Attack

  ross Site Request Forgery Attack is also known as CSRF or XSRF in short. Do not confuse it with Cross Site Scripting attack because it is totally different from that. Like SQL injection and XSS, CSRF is also one in top 10 OWASP web vulnerabilities for many...
Continue reading