Latest News


2019’s Most Common IoT Security Threats to Consider

Being used in hitherto unheard of sectors, IoT is gaining momentum day in day out! Due to which more and more companies are jumping on the IoT bandwagon with various point solutions and capabilities.
Effective Network Scanning Tools

Effective Network Scanning Tools

What is network security First of all, let's try to understand what is network security and on the next step we going to list and discuss security tools...
Penetration testing tricks

Black Box Penetration Testing Tips & Tricks

Let's quickly walk through some interesting and useful tricks for penetration testing with black box modal approach. This article oriented mostly for external type of pentesting where you have steps of active...
Vega - Web Application Security Scanner


Vega is a free and open source web security scanner and web security testing platform to test the security of web applications. Vega can help you find and validate SQL Injection, Cross-Site...
Building recon tool

Automated recon tool with PHP, cURL, wafw00f, WhatWeb, Whois

Recon (Reconnaissance) - The act of gathering important information on a target system. This information can be used to better attack the target. For example, open source search engines can be used...
Vulnerability Assessment

Vulnerability Assessment

A vulnerability assessment is the process of defining and identification, classifying and prioritizing vulnerabilities in networks and computer systems, applications and databases and providing the organization doing the assessment with the...

Quick Vulnerability Assessment of Web Application & Server

Today we going to emulate quick and simple vulnerability assessment of our web application with help of some open source security tools. List of tools we going to use is available below:
Blackwidow scanner


BlackWidow is a python based web application spider to gather subdomains, URL's, dynamic parameters, email addresses and phone numbers from a target website. This project also includes Inject-X fuzzer to scan dynamic...
What is penetration testing

What is penetration testing

Many companies without own security department or competencies ask what penetration testing is and why it is needed. First of all, I propose to sort out the question - what is it...
OWASP TOP10 2017

OWASP TOP10 2017

New OWASP TOP10 classification was improved with the latest trends in information security and web application security. Some points were removed, some new added or merged into one. Below we can see...

Bug Bounty