Tools Category

Reversemap

Analyse SQL injection attempts in web server logs   reversemap Analyse SQL injection attempts in web server logs The program can either be run in batch mode or interactive mode. In batch mode the program will accept Apache web server logs and will deobfuscate requested URLs from the logs. In Read more…

Loading

Tools Category

FiercePhish

A Full-Fledged Phishing Framework To Manage All Phishing Engagements   FiercePhish FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more. The features will continue to be expanded and will include website spoofing, click Read more…

Loading

Tools Category

OWASP Security Shepherd

Web And Mobile Application Security Training Platform OWASP Security Shepherd The OWASP Security Shepherd Project is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices Read more…

Loading

How to access blocked websites

1. Become Anonymous: Use Proxy Websites Very often, in a professional environment, the employers draw certain boundaries, restricting your the access to some particular websites. At times, you need a way to access the blocked websites and in those situations, proxy websites act as a rescue method. On the web, Read more…

Loading