Introduction To Web Application/Database Pentesting Tools In Kali Linux 2.0

Hello my newbie hackers, here is the list of whole tools in kali linux which is used for web application or database pentesting in kali linux 2.0.  The List is sorted into 7 categories: CMS Identification Database Exploitation IDS/IPS Identification Web Applicaion Fuzzer Web Application Proxies Web Crawlers Web Vulnerability Scanner 1. CMS Identification A […]

How to Setup Nessus in Kali Linux – Most Used Vulnerability Scanner in 2015

Tenable Network Security Nessus is one of the most comprehensive and widely deployed vulnerability assessment tools. Recently went closed source, but is still essentially free. Works with a client-server frame-work. Nessus Remote Security Scanner is the most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the worlds largest organizations are realizing significant […]

How To Bypass Antivirus Detection Using Veil-Evasion In Kali Linux

Veil is a Python program that attempts to automate the creation of AV-evading payloads in a new framework.One of the most important issues any hacker must address is how to get past security devices and remain undetected. These can include antivirus software, intrusion detection systems, firewalls, web application firewalls, and numerous others. As nearly all […]

Improved Features Of New Kali Linux 2.0 And How To Upgrade To It

Kali 2.0 (Kali Sana) was released last week which means that we get to spend some time sifting through Offensive Security‘s latest release looking at all the new tools and tricks. Offensive Security promised us a better, more powerful penetration testing platform, and my preliminary look at 2.0 shows that they delivered. Here is my […]

Begin typing your search above and press enter to search. Press ESC to cancel.

Back To Top