Blog

Latest news around the world

12

Nov'19

How and Why You Should Encrypt Your USB Data by Richard LeCount

If you deposit sensitive data on your USB stick, then you must consider encryption to secure your information in the …

Read More

07

Nov'19

PHP is dead…Viva le PHP! By Sergii Shanin

The fracas over Gutenberg and WordPress is the latest installment in the death of PHP. Take a deep breath everybody. …

Read More

07

Nov'19

Vulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of CMS

Vulnx is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of CMS, fast CMS detection, informations …

Read More

06

Nov'19

IPv4 and IPv6 analysis in Wireshark [FREE COURSE CONTENT]

In this video from our Packet Analysis with Wireshark course by Atul Tiwari we learn how to perform IPv4 and …

Read More

06

Nov'19

ezXSS - An Easy Way For Penetration Testers And Bug Bounty Hunters To Test (Blind) XSS

Current features Some features ezXSS has Easy to use dashboard with statics, payloads, view/share/search reports and more Payload generator Instant …

Read More

04

Nov'19

XORpass is an encoder to bypass WAF filters using XOR operations.

Installation & Usage git clone https://github.com/devploit/XORpass cd XORpass $ php encode.php STRING $ php decode.php "XORed STRING" Example of bypass: …

Read More

29

Oct'19

The United States Will Eventually Have Its Own Version of The GDPR - Here's How To Prepare by Tim Mullahy

Europe’s General Data Protection Regulation was in many ways a game-changer. Never before did a regulatory framework give consumers so much control over their personal information. Not surprisingly, many other nations are following the EU’s lead - including the United States. Here’s what you need to know.

Read More

28

Oct'19

Why Biometric Authentication is Better than Passwords by Alex Hunter

Given the range of system logins enterprise users and customers have to access every day, the process of keying in …

Read More

28

Oct'19

HomePwn - Swiss Army Knife for Pentesting of IoT Devices

HomePwn is a framework that provides features to audit and pentesting devices that company employees can use in their day-to-day …

Read More

25

Oct'19

OpenCTI - Open Cyber Threat Intelligence Platform

OpenCTI is an open source platform allowing organizations to manage their cyber threat intelligence knowledge and observables. It has been …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013