Most Advanced Penetration Testing Distribution

Best Linux Penetration Testing Distributions Linux Penetration Testing Distributions are a group of special-purpose Linux distributions used for analyzing and evaluating system and network security. Almost all of those distros can run LIVE from an optical or a USB drive, and most of them are installable and can be used as a standalone Linux distribution. Read more about Most Advanced Penetration Testing Distribution[…]

How exploit-db(Database)

New Features in the Exploit Database Over the past 6 years, we have been maintaining and updating the Exploit Database on a daily basis, which now boasts over 35,000 exploits. While we constantly work on improving our back-end and entry quality. Over the years there haven’t really been any updates to the front-end, which has traditionally Read more about How exploit-db(Database)[…]

kali-linux-nethunter

Kali Linux NetHunter for Nexus and OnePlus The Kali Linux NetHunter project is the first Open Source Android penetration testing platform for Nexus devices, created as a joint effort between the Kali community member “BinkyBear” and Offensive Security. NetHunter supports Wireless 802.11 frame injection, one-click MANA Evil Access Point setups, HID keyboard (Teensy like attacks), Read more about kali-linux-nethunter[…]

Kali Linux Rolling Virtual & ARM

Kali Linux is Now a Rolling Distribution One of the biggest moves we’ve taken to keep Kali 2.0 up-to-date in a global, continuous manner, is transforming Kali into a rolling distribution. What this means is that we are pulling our packages continuously from Debian Testing(after making sure that all packages are installable) – essentially upgrading the Kali core system, while allowing us to take Read more about Kali Linux Rolling Virtual & ARM[…]

Twitter has paid over $300,000 to security researchers in 2 years

Twitter paid security researchers $322,420 to find security vulnerabilities As services like Twitter have become critical infrastructure for people to communicate and share ideas, maintaining security and uptime is essential. But these companies can’t do it themselves and some have turned to bug bounty programs to solicit help from the public. For Twitter, it has Read more about Twitter has paid over $300,000 to security researchers in 2 years[…]