Tag

security tools

0 views collected around this technical thread.

Raymond Ops
Raymond Ops
Mar 5, 2025 · Information Security

Essential Kali Linux Penetration Testing Tools and How to Use Them

Explore the most common Kali Linux penetration testing utilities—including Nmap, Metasploit, Hydra, Wireshark, and more—organized by categories such as information gathering, vulnerability exploitation, password cracking, and network monitoring, with brief usage commands and guidance for each tool.

Kali Linuxmalware analysisnetwork scanning
0 likes · 11 min read
Essential Kali Linux Penetration Testing Tools and How to Use Them
DevOps Operations Practice
DevOps Operations Practice
Jul 11, 2024 · Information Security

Top 7 Penetration Testing Tools and Their Key Features

This article introduces seven leading penetration testing tools—including Kali Linux, Metasploit, Wireshark, Nmap, Burp Suite, Acunetix, and Nessus—detailing their primary features and how they help security professionals identify and mitigate vulnerabilities effectively.

Burp SuiteKali LinuxMetasploit
0 likes · 9 min read
Top 7 Penetration Testing Tools and Their Key Features
DevOps Operations Practice
DevOps Operations Practice
Apr 21, 2024 · Information Security

Overview of Kali Linux: Features, Tools, and Use Cases

Kali Linux, a Debian‑based distribution maintained by Offensive Security, bundles over 600 penetration‑testing and digital‑forensics tools such as Metasploit, Nmap, Wireshark, Aircrack‑ng and John the Ripper, making it a preferred platform for security professionals in testing, forensics, and network defense.

Digital ForensicsInformation SecurityKali Linux
0 likes · 4 min read
Overview of Kali Linux: Features, Tools, and Use Cases
Laravel Tech Community
Laravel Tech Community
Oct 9, 2022 · Information Security

New Features and Changes in Wireshark 4.0

Wireshark 4.0 introduces a revamped default layout with adjacent detail and byte views, enhanced Conversations and Endpoints dialogs, consistent hex‑dump import tools, drops 32‑bit Windows support, and plans future dark‑mode and Arm64 features, offering a more modern and powerful network analysis experience.

Hex DumpProtocol AnalyzerVersion 4.0
0 likes · 4 min read
New Features and Changes in Wireshark 4.0
Python Programming Learning Circle
Python Programming Learning Circle
Jan 19, 2022 · Information Security

File Transfer Techniques for Penetration Testing: Linux and Windows Download Commands

This article compiles common file download commands and tools used in penetration testing for both Linux and Windows environments, covering utilities such as wget, curl, axel, aria2, PowerShell, certutil, bitsadmin, and others, with example syntax for direct, background, and resumable transfers.

Linuxcommand-linefile download
0 likes · 13 min read
File Transfer Techniques for Penetration Testing: Linux and Windows Download Commands
DevOps Cloud Academy
DevOps Cloud Academy
Sep 3, 2021 · Operations

2021 China DevOps Landscape Survey Report Highlights

The 2021 China DevOps Landscape Survey, conducted by the Cloud Computing Open Source Industry Alliance with 1,862 valid responses across multiple sectors, reveals that over half of Chinese enterprises have reached comprehensive DevOps maturity, agile development is widespread, DevSecOps adoption exceeds 50%, and IAST tools, especially Xmirror’s LingMai, dominate the security tooling market.

DevOpsDevSecOpsIAST
0 likes · 6 min read
2021 China DevOps Landscape Survey Report Highlights
Architects Research Society
Architects Research Society
Aug 10, 2020 · Information Security

Awesome Penetration Testing Resources and Tools

This article compiles a comprehensive, categorized collection of penetration testing resources—including anonymity tools, antivirus evasion utilities, books, CTF frameworks, Docker containers, network analysis tools, OSINT platforms, and more—providing security professionals and researchers with a valuable reference for offensive security engagements.

CTFDockerOSINT
0 likes · 36 min read
Awesome Penetration Testing Resources and Tools
Architects Research Society
Architects Research Society
Sep 19, 2019 · Information Security

Awesome Penetration Testing Resources and Tools

This comprehensive collection presents a curated list of penetration testing resources—including anonymity tools, antivirus‑evasion utilities, books, CTF frameworks, Docker containers for vulnerable systems, network analysis utilities, OSINT services, reverse‑engineering tools, and security education materials—providing security professionals and researchers with a valuable reference for offensive security testing and learning.

CTFDockerOSINT
0 likes · 36 min read
Awesome Penetration Testing Resources and Tools
Efficient Ops
Efficient Ops
Jun 14, 2018 · Information Security

From Zero to Security Exploitation Pro: Practical Steps to Master Vulnerability Hunting

This article shares a step‑by‑step learning path for aspiring security researchers, emphasizing solid knowledge, hands‑on practice, experience accumulation, essential tools, and effective use of platforms like Shodan and ZoomEye to build real‑world testing scenarios.

Information Securityexperiencelearning path
0 likes · 12 min read
From Zero to Security Exploitation Pro: Practical Steps to Master Vulnerability Hunting
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Nov 2, 2017 · Information Security

Uncovering Broken Link Hijacking: Techniques, Real‑World Cases, and Detection Tools

This article explains broken link hijacking, detailing stored and reflected attack vectors such as account spoofing, external JavaScript takeover, information leakage, and content hijacking, provides real‑world examples, and introduces practical tools like broken‑link‑checker and twitterBFTD for discovering vulnerable expired links.

Information Securitybroken link hijackingreflected XSS
0 likes · 6 min read
Uncovering Broken Link Hijacking: Techniques, Real‑World Cases, and Detection Tools