• ADD CAPTION HERE

  • ADD CAPTION HERE

  • Helper Blogger

Saturday, August 23, 2014

Ghost Phisher

It is a Wireless and Ethernet security auditing and attack software program written using the Python Programming Language and the Python Qt GUI library, the program is able to emulate access points...

How to Hire PHP Programmers

What are your requirements? Do you have a technical background? Are you a going to work alongside your developers, or would you rather send off a specification and get weekly updates? Are you going to manage the project? If you feel comfortable developing and reviewing code yourself, you may wish to...
3:17 PMMuhammad Arsalan Siddiqui

SQLMap for Cloudflare protected sites

When you suspect your target site is vulnerable to SQLi and you find out that it is protected by Cloudflare, you can still to launch SQLMap against the target.First of all, you need to make sure the target site is protected by Cloudflare, you can add "--identify-waf" or "--check-waf" to confirm. However,...

An A-Z Index of the Windows CMD command line

(  SS64  ) Links Syntax An A-Z Index of the Windows CMD command line ADDUSERS Add or list users to/from a CSV file ADmodcmd Active Directory Bulk Modify ARP ...
3:11 PMMuhammad Arsalan SiddiquiWindows

Cisco CCNA in 60 Days, 2nd Edition

Editorial Reviews AMAZON BESTSELLER Completely revised and updated for the new Cisco exams:200-120 CCNA100-101 ICND1200-101 ICND2FREE SUPPORTThe book is supported for free at in60days.com so just...
3:06 PMMuhammad Arsalan SiddiquiEbook

How to Add Multiple Routes in Linux Using IP Command Examples

Apart from the default route, you can also configure additional routes. For example, your server you might have 2 interfaces (eth0 and eth1). By default, all the traffic is routed through interface eth0 irrespective of what IP address you have configured on eth1. To route the incoming and outgoing...
2:48 PMMuhammad Arsalan SiddiquiLinux

OWASP RainbowMaker v1.2 Released

OWASP Rainbow Maker is free to use. It is licensed under the GNU GPL v3 License. Compatible with Win 32-bit.Supported Two modes:Crack the hashCreate a Rainbow Table Download location 1  Download location 2  Download location 3  More info: Rainbow_Maker_Project&nb...
2:44 PMMuhammad Arsalan SiddiquiHacking

OWASP WebSpa Project v0.7 – Java Web Knocking Tool Released

The OWASP WebSpa Project is a Java web knocking tool for sending a single HTTP/S request to your web server in order to authorize the execution of a premeditated Operating System (O/S) command. It provides a cryptographically protected “open sesame” mechanism on the web application layer, comparable...
2:35 PMMuhammad Arsalan Siddiqui

Lynis v1.5.9 Released

Lynis is an auditing tool which tests and gathers (security) information from Unix based systems. The audience for this tool are security and system auditors, network specialists and system maintainers.Some of the (future) features and usage options:System and security audit checksFile Integrity...
2:11 PMMuhammad Arsalan Siddiqui

Ethical Hacking for Beginners

Learning hacking is very difficult. Unlike programming or any other thing you have to work really hard to get to know something. Because there are closed communities, not especially friendly...
2:08 PMMuhammad Arsalan SiddiquiEbook

Cybersecurity for Executives: A Practical Guide

Description: Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business Emphasizes, in a direct and uncomplicated way,...
1:41 PMMuhammad Arsalan SiddiquiEbook

Make Your Own SMS Bomber

You can make your own sms bomber in few steps. You just have to follow the instructions listed in the Pdf file. Method is in privacy, alternately you can download the pdf file by clicking below: Download...
1:23 PMMuhammad Arsalan SiddiquiEbook