Tagged articles
40 articles
Page 1 of 1
Black & White Path
Black & White Path
May 2, 2026 · Information Security

Phalanx: An Open‑Source Autonomous Pentesting Assistant for Kali Linux

Phalanx is an open‑source, polyglot‑based automation framework for Kali Linux that coordinates Python, Bash and other scripts, provides a planner, engine and reporting modules, integrates with tools like Nmap and Metasploit, and generates traceable logs for efficient and flexible penetration testing.

Kali Linuxautomationopen‑source
0 likes · 4 min read
Phalanx: An Open‑Source Autonomous Pentesting Assistant for Kali Linux
Black & White Path
Black & White Path
Mar 28, 2026 · Information Security

Network Security Red Book: 700+ Tools from Recon to Internal Penetration

This article compiles over 700 high‑quality open‑source security projects from GitHub, categorised by functional scenarios such as automated reconnaissance, information gathering, vulnerability exploitation, internal network penetration, evasion, and incident response, providing a comprehensive practical toolkit for red‑team, blue‑team and security researchers.

network securityopen‑sourcepenetration testing
0 likes · 18 min read
Network Security Red Book: 700+ Tools from Recon to Internal Penetration
Black & White Path
Black & White Path
Feb 28, 2026 · Information Security

A Complete Guide to Mobile App Penetration Testing

This article presents a thorough mobile app penetration‑testing guide covering objectives, scope, testing methods, step‑by‑step workflow, recommended tools, reporting structure, and remediation advice to help developers and security professionals secure their applications.

Dynamic analysisfuzz testingmobile app
0 likes · 11 min read
A Complete Guide to Mobile App Penetration Testing
Black & White Path
Black & White Path
Feb 22, 2026 · Information Security

30 Practical Web Penetration Testing Techniques You Must Know

This guide walks through 30 hands‑on web penetration testing techniques covering the full workflow—from information gathering and vulnerability discovery to privilege escalation, internal network pivoting, and defense evasion—providing concrete commands, tool recommendations, and real‑world tips for security engineers and testers.

Information GatheringWeb Securitydefense evasion
0 likes · 26 min read
30 Practical Web Penetration Testing Techniques You Must Know
Ops Community
Ops Community
Oct 28, 2025 · Information Security

Master Vulnerability Scanning: Xray, X‑Scan, AppScan & Nessus Quick‑Start Guide

This article explains what vulnerability scanning is and provides concise, step‑by‑step instructions for using four popular security scanners—Xray, X‑Scan, IBM AppScan, and Nessus—including download links, command‑line examples, plugin selection, and result export, while omitting promotional content.

AppScanX-ScanXray
0 likes · 6 min read
Master Vulnerability Scanning: Xray, X‑Scan, AppScan & Nessus Quick‑Start Guide
Raymond Ops
Raymond Ops
Mar 5, 2025 · Information Security

Essential Kali Linux Penetration Testing Tools and How to Use Them

Explore the most common Kali Linux penetration testing utilities—including Nmap, Metasploit, Hydra, Wireshark, and more—organized by categories such as information gathering, vulnerability exploitation, password cracking, and network monitoring, with brief usage commands and guidance for each tool.

Kali LinuxNetwork Scanningmalware analysis
0 likes · 11 min read
Essential Kali Linux Penetration Testing Tools and How to Use Them
DevOps Operations Practice
DevOps Operations Practice
Jul 11, 2024 · Information Security

Top 7 Penetration Testing Tools and Their Key Features

This article introduces seven leading penetration testing tools—including Kali Linux, Metasploit, Wireshark, Nmap, Burp Suite, Acunetix, and Nessus—detailing their primary features and how they help security professionals identify and mitigate vulnerabilities effectively.

Burp SuiteKali LinuxMetasploit
0 likes · 9 min read
Top 7 Penetration Testing Tools and Their Key Features
DevOps Operations Practice
DevOps Operations Practice
Apr 21, 2024 · Information Security

Overview of Kali Linux: Features, Tools, and Use Cases

Kali Linux, a Debian‑based distribution maintained by Offensive Security, bundles over 600 penetration‑testing and digital‑forensics tools such as Metasploit, Nmap, Wireshark, Aircrack‑ng and John the Ripper, making it a preferred platform for security professionals in testing, forensics, and network defense.

Kali Linuxdigital forensicsinformation security
0 likes · 4 min read
Overview of Kali Linux: Features, Tools, and Use Cases
Liangxu Linux
Liangxu Linux
Aug 22, 2023 · Information Security

Explore siusiu: A Docker‑Based Penetration Testing Toolbox with Over 50 Ready‑to‑Use Security Tools

siusiu is a Docker‑based penetration testing toolbox that bundles more than 50 security utilities, offers an interactive console for listing, downloading, and running tools, supports non‑interactive mode, and can be installed via binary, Git, or Go with detailed usage commands.

Dockerinformation securitypenetration testing
0 likes · 5 min read
Explore siusiu: A Docker‑Based Penetration Testing Toolbox with Over 50 Ready‑to‑Use Security Tools
MaGe Linux Operations
MaGe Linux Operations
Aug 17, 2023 · Information Security

Explore siusiu: A Docker‑Powered Penetration Testing Toolbox

siusiu is a Docker‑based penetration testing toolbox that bundles dozens of security utilities as Docker images, offering an easy‑to‑use console, multiple installation methods, and a rich command set for both interactive and scripted security assessments.

DevOpsDockerinformation security
0 likes · 6 min read
Explore siusiu: A Docker‑Powered Penetration Testing Toolbox
Liangxu Linux
Liangxu Linux
May 2, 2023 · Information Security

Kali Linux vs Parrot OS: Which Penetration Testing Distro Is Right for You?

An in‑depth comparison of Kali Linux and Parrot OS examines their origins, pre‑installed security tools, customization options, hardware requirements, user interfaces, and performance, helping security professionals and enthusiasts choose the most suitable Linux distribution for penetration testing and privacy‑focused work.

Kali LinuxLinux DistributionParrot OS
0 likes · 10 min read
Kali Linux vs Parrot OS: Which Penetration Testing Distro Is Right for You?
Liangxu Linux
Liangxu Linux
Mar 26, 2023 · Information Security

Top 10 Vulnerability Scanners Every Security Professional Should Know

This article reviews the ten most popular vulnerability scanning tools—including OpenVAS, Tripwire IP360, Nessus, and others—detailing their key features, scanning capabilities, deployment options, and typical use cases to help security professionals choose the right solution for network and application vulnerability assessment.

OpenVASnessusnetwork security
0 likes · 10 min read
Top 10 Vulnerability Scanners Every Security Professional Should Know
MaGe Linux Operations
MaGe Linux Operations
Mar 5, 2023 · Information Security

Top 10 Vulnerability Scanners Every Security Team Needs

This guide reviews the ten leading vulnerability scanning solutions, detailing each tool's key features, deployment options, and how they help organizations detect and remediate security weaknesses across networks, servers, cloud and container environments.

information securitynetwork securityopen‑source
0 likes · 7 min read
Top 10 Vulnerability Scanners Every Security Team Needs
Laravel Tech Community
Laravel Tech Community
Oct 9, 2022 · Information Security

New Features and Changes in Wireshark 4.0

Wireshark 4.0 introduces a revamped default layout with adjacent detail and byte views, enhanced Conversations and Endpoints dialogs, consistent hex‑dump import tools, drops 32‑bit Windows support, and plans future dark‑mode and Arm64 features, offering a more modern and powerful network analysis experience.

Hex DumpProtocol AnalyzerVersion 4.0
0 likes · 4 min read
New Features and Changes in Wireshark 4.0
Open Source Linux
Open Source Linux
Aug 16, 2022 · Information Security

Essential White‑Hat Hacker FAQ: Tools, Techniques, and Defense Strategies

This comprehensive guide explains what white‑hat hackers are, the differences between IP and MAC addresses, common hacking tools, hacker types, footprinting methods, brute‑force and DoS attacks, SQL injection, network sniffing, ARP spoofing, MAC flooding, rogue DHCP, XSS, Burp Suite, domain pharming, prevention tactics, keyloggers, enumeration, NTP, MIB, password‑cracking techniques, attack phases, and CSRF protection, offering a solid foundation for cybersecurity awareness.

cybersecuritypenetration testingsecurity tools
0 likes · 11 min read
Essential White‑Hat Hacker FAQ: Tools, Techniques, and Defense Strategies
Open Source Linux
Open Source Linux
May 11, 2022 · Information Security

Top 9 Essential Tools Every Ethical Hacker Should Master

This article introduces ethical hacking and presents nine widely used security tools—including Nmap, Nessus, Nikto, Kismet, NetStumbler, Acunetix, Netsparker, Intruder, and Metasploit—detailing their main features, platforms, and how they help professionals identify vulnerabilities and protect networks.

ethical hackingpenetration testingsecurity tools
0 likes · 7 min read
Top 9 Essential Tools Every Ethical Hacker Should Master
MaGe Linux Operations
MaGe Linux Operations
Oct 24, 2021 · Information Security

Top 10 Web Log Security Analysis Tools You Should Try

Discover ten easy‑to‑use web log security analysis tools that help you trace attackers, identify vulnerabilities, and visualize malicious activity, ranging from open‑source visualizers to enterprise‑grade SIEM platforms.

Log MonitoringSIEMinformation security
0 likes · 4 min read
Top 10 Web Log Security Analysis Tools You Should Try
DevOps Cloud Academy
DevOps Cloud Academy
Sep 3, 2021 · Operations

2021 China DevOps Landscape Survey Report Highlights

The 2021 China DevOps Landscape Survey, conducted by the Cloud Computing Open Source Industry Alliance with 1,862 valid responses across multiple sectors, reveals that over half of Chinese enterprises have reached comprehensive DevOps maturity, agile development is widespread, DevSecOps adoption exceeds 50%, and IAST tools, especially Xmirror’s LingMai, dominate the security tooling market.

ChinaDevOpsDevSecOps
0 likes · 6 min read
2021 China DevOps Landscape Survey Report Highlights
Python Crawling & Data Mining
Python Crawling & Data Mining
Jul 28, 2021 · Information Security

Essential Network Security Tools: A Comprehensive Beginner's Guide

This article presents a curated list of network security utilities—including anti‑malware, scanners, encryption, IDS, port scanners, exploit frameworks, monitoring, proxies, wireless, rootkit detectors, and packet sniffers—each with brief descriptions and download links for aspiring security practitioners.

intrusion detectionnetwork securitypacket sniffing
0 likes · 17 min read
Essential Network Security Tools: A Comprehensive Beginner's Guide
Liangxu Linux
Liangxu Linux
Sep 19, 2020 · Information Security

Step-by-Step Guide: Installing Kali Linux on VirtualBox

This article explains what Kali Linux is, provides the official download link, and walks you through creating a VirtualBox VM, configuring settings, performing a graphical installation, and highlights important security warnings for using this penetration‑testing distribution.

Kali LinuxLinux InstallationVirtualBox
0 likes · 5 min read
Step-by-Step Guide: Installing Kali Linux on VirtualBox
Architects Research Society
Architects Research Society
Aug 10, 2020 · Information Security

Awesome Penetration Testing Resources and Tools

This article compiles a comprehensive, categorized collection of penetration testing resources—including anonymity tools, antivirus evasion utilities, books, CTF frameworks, Docker containers, network analysis tools, OSINT platforms, and more—providing security professionals and researchers with a valuable reference for offensive security engagements.

CTFDockerOSINT
0 likes · 36 min read
Awesome Penetration Testing Resources and Tools
Architects Research Society
Architects Research Society
Sep 19, 2019 · Information Security

Awesome Penetration Testing Resources and Tools

This comprehensive collection presents a curated list of penetration testing resources—including anonymity tools, antivirus‑evasion utilities, books, CTF frameworks, Docker containers for vulnerable systems, network analysis utilities, OSINT services, reverse‑engineering tools, and security education materials—providing security professionals and researchers with a valuable reference for offensive security testing and learning.

CTFDockerInfoSec
0 likes · 36 min read
Awesome Penetration Testing Resources and Tools
Liangxu Linux
Liangxu Linux
Aug 5, 2019 · Information Security

Top 12 Linux Distributions for Penetration Testing and Security Research

This guide presents a curated list of twelve Linux distributions—such as Kali Linux, BackBox, Parrot Security OS, and others—detailing their origins, key security tools, desktop environments, installation options, and unique features that make them ideal for ethical hacking, forensics, and network security assessments.

ForensicsInfoSecpenetration testing
0 likes · 8 min read
Top 12 Linux Distributions for Penetration Testing and Security Research
MaGe Linux Operations
MaGe Linux Operations
Nov 15, 2018 · Information Security

Top 123 Python Tools for Pen Testing, Reverse Engineering & Forensics

A comprehensive, curated list of 123 Python-based security tools spans network analysis, debugging, reverse engineering, fuzzing, web testing, forensics, malware analysis, PDF inspection, miscellaneous utilities, plus recommended libraries, books, and learning resources for penetration testers and security researchers.

Forensicsfuzzingpenetration testing
0 likes · 16 min read
Top 123 Python Tools for Pen Testing, Reverse Engineering & Forensics
ITPUB
ITPUB
Aug 30, 2018 · Information Security

Mastering Reverse Shells: 30+ Techniques Across Linux, Windows, and Network Protocols

This article provides a comprehensive collection of reverse‑shell techniques—including Perl, Bash, Python, PowerShell, Java, and protocol‑specific methods like ICMP, UDP, and DNS—complete with command‑line examples, code snippets, and practical tips for both Linux and Windows environments.

Network Protocolspenetration testingreverse shell
0 likes · 15 min read
Mastering Reverse Shells: 30+ Techniques Across Linux, Windows, and Network Protocols
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Nov 2, 2017 · Information Security

Uncovering Broken Link Hijacking: Techniques, Real‑World Cases, and Detection Tools

This article explains broken link hijacking, detailing stored and reflected attack vectors such as account spoofing, external JavaScript takeover, information leakage, and content hijacking, provides real‑world examples, and introduces practical tools like broken‑link‑checker and twitterBFTD for discovering vulnerable expired links.

broken link hijackingreflected XSSsecurity tools
0 likes · 6 min read
Uncovering Broken Link Hijacking: Techniques, Real‑World Cases, and Detection Tools
MaGe Linux Operations
MaGe Linux Operations
Aug 12, 2017 · Information Security

123 Essential Python Tools for Penetration Testing and Security Research

This article compiles a comprehensive list of 123 Python-based penetration testing tools, covering network utilities, debugging and reverse‑engineering frameworks, fuzzing platforms, web testing kits, forensic analysis utilities, malware analysis helpers, PDF inspection modules, miscellaneous libraries, recommended books, talks, and additional resources for security professionals.

ForensicsPythonfuzzing
0 likes · 17 min read
123 Essential Python Tools for Penetration Testing and Security Research