Irfan Shakeel

68 POSTS0 COMMENTS

Amazon Releases New C++ Friendly Features

AWS (Amazon Web Service) has announced that they have opened up their serverless language support. This allows developers to bring their preferred coding language...

Acunetix Vulnerability Scanner Now Also on Linux

Acunetix, the pioneer in automated web application security software, has announced the release of Acunetix Vulnerability Scanner for Linux. Known to be reliable, cost...

How to Create an Activity Log for WordPress Sites (And Why You Should)

One of the most critical aspects of web security is being able to monitor what happens on your site. To do this effectively, you could implement...

How to Recover from a Hacked Website Event?

Any fellow webmaster you may ask who is beyond the novice stage will agree that one of his top priorities will always be keeping...

A Security-focused Introduction to HTTP

HTTP is a ubiquitous protocol and is one of the cornerstones of the web. If you are a newcomer to web application security, a...

SIP-Based Audit and Attack Tool – Mr.SIP

Mr.SIP is a tool developed to audit and simulate SIP-based attacks. Originally it was developed to be used in academic work to help developing...

raven: Linkedin Information Gathering Tool

raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees using Linkedin.Please do not...

D0xk1t: OSINT & Active Reconnaissance Suite

D0xk1t is an open-source, self-hosted and easy to use OSINT and active reconaissance web application for penetration testers. Based off of the prior command-line...

Use Metasploit on WAN without Port Forwarding

In all of my previous Metasploit articles or videos, I am always performing attacks on LAN. Lots of people were asking me how to use Metasploit...

The 5 Most Securely Managed WordPress Hosting Services of 2017

Over the past few years, hackers have begun to target WordPress websites. This is in part due to the platform’s booming popularity amongst both amateur and...

TOP AUTHORS

1111 POSTS56 COMMENTS
68 POSTS0 COMMENTS
0 POSTS0 COMMENTS
- Advertisment -

Most Read

Ask These 5 Questions before Selecting Application Security Solution

There are various factors when purchasing an application security solution in an organization. As organizations are at higher risk and attacker are continuously trying...

OSINT tutorial to Find Information from a Phone Number – PhoneInfoga Tool

Phone number plays a vital role in the social engineering and the open source intelligence investigation. Everyone carry’s phone, the phone is now linked with an...

5G – A Business Owner’s Dream, A Hacker’s Fantasy

5G is coming within the next year. It will be so fast that it will make current fibre broadband speeds positively snail-like. That’s all good news, isn’t it? It...

Best 5 Ways to Track an iPhone Remotely

In a world where almost everything revolves around smartphones, losing your iPhone is a big inconvenience. Besides the hefty price tag, there is huge data at...