Most Advanced Penetration Testing Distribution

Best Linux Penetration Testing Distributions Linux Penetration Testing Distributions are a group of special-purpose Linux distributions used for analyzing and evaluating system and network security. Almost all of those distros can run LIVE from an optical or a USB drive, and most of them are installable and can be used as a standalone Linux distribution. Read more about Most Advanced Penetration Testing Distribution[…]

How exploit-db(Database)

New Features in the Exploit Database Over the past 6 years, we have been maintaining and updating the Exploit Database on a daily basis, which now boasts over 35,000 exploits. While we constantly work on improving our back-end and entry quality. Over the years there haven’t really been any updates to the front-end, which has traditionally Read more about How exploit-db(Database)[…]

kali-linux-nethunter

Kali Linux NetHunter for Nexus and OnePlus The Kali Linux NetHunter project is the first Open Source Android penetration testing platform for Nexus devices, created as a joint effort between the Kali community member “BinkyBear” and Offensive Security. NetHunter supports Wireless 802.11 frame injection, one-click MANA Evil Access Point setups, HID keyboard (Teensy like attacks), Read more about kali-linux-nethunter[…]

Kali Linux Rolling Virtual & ARM

Kali Linux is Now a Rolling Distribution One of the biggest moves we’ve taken to keep Kali 2.0 up-to-date in a global, continuous manner, is transforming Kali into a rolling distribution. What this means is that we are pulling our packages continuously from Debian Testing(after making sure that all packages are installable) – essentially upgrading the Kali core system, while allowing us to take Read more about Kali Linux Rolling Virtual & ARM[…]

Twitter has paid over $300,000 to security researchers in 2 years

Twitter paid security researchers $322,420 to find security vulnerabilities As services like Twitter have become critical infrastructure for people to communicate and share ideas, maintaining security and uptime is essential. But these companies can’t do it themselves and some have turned to bug bounty programs to solicit help from the public. For Twitter, it has Read more about Twitter has paid over $300,000 to security researchers in 2 years[…]

Fake Invoice Email Scams

How to spot invoice scams that look like they mean business: Internet Scambusters #280 Invoice scams — bills for goods and services you’ve never ordered or received — rake in billions of dollars for fraudsters every year. Oftentimes they look like the genuine article but are actually phony. They’re not invoices but offers — what Read more about Fake Invoice Email Scams[…]