Clone any website with httrack
What is HTTRACK? Httrack is a free and open source offline browser developed by Xavier Roche. Httrack allow users to download websites. It copies the whole website on the computer.Read More →
What is HTTRACK? Httrack is a free and open source offline browser developed by Xavier Roche. Httrack allow users to download websites. It copies the whole website on the computer.Read More →
NIKTO:- Nikto is a web scanner which test the web servers /URL of the target. Nikto performs the comprehensive scan, checks the outdated version of servers. It scans over 6700Read More →
What is WAPITI? Wapiti is a black box scanner. It only scans the webpage not source code fo the target. Wapiti only discover’s the vulnerabilities in a web application andRead More →
This bug would have allowed the massive collection of the social network users’ data Facebook cybersecurity and digital forensics teams have detected another security bug in the underlying code baseRead More →
The incident has compromised the security of the company employees’ information Nordstrom, the luxurious department stores chain, is in the process of notifying its employees that their personal information couldRead More →
The company recommends users to update their systems as soon as possible, because among the errors found there are zero-day vulnerabilities Last Tuesday Microsoft has launched a new round ofRead More →
ATM pentests showed alarming results for banks ATMs are vulnerable to a number of basic attack techniques that would allow any hacker with minimal knowledge and resources to steal thousandsRead More →
What is W3af? W3af is a tool used in auditing and exploitation of web applications. It’s an open source python based web vulnerability scanner. The tool also has GUI version.Read More →
DNSTRACER:- Dnstracer is a Domain Name Server Information gathering tool, which extract unique DNS information about a domain. It extracts different types of DNS records like NS, MX, A, AAAA,Read More →
What is DIRBUSTER? Dirbuster/ Directory Traversal Attacks where attacker can use dictionary of word list to find hidden or not hidden directories and files on the target web application &Read More →