Fetch URLs with GetAllUrls (GAU)

Fetch URLs with GetAllUrls

Getting as much information about the target as possible is very important during penetration testing. If you are a seasoned bug bounty hunter you know that sometimes there are low hanging fruits. Hidden subdomain with exposed secret, or a password might result in a big payout. That’s why it is very important to find everything …

Read more

How to Install DirBuster on Ubuntu?

How to install DirBuster on Ubuntu

DirBuster is one of the handy tools that is used during the reconnaissance stage. It helps to discover existing directories of the system. In simple words, it is a multithreaded application for brute forcing the directories. So, basically, it works like this: you launch the DirBuster, choose a dictionary, set the target, and launch the attack. …

Read more

Moodle Penetration Testing Checklist and Tools

Moodle penetration testing checklist and tools

Moodle is one of the most popular learning management systems (LMS) that provides environment for learning, testing, and training. This software is used by a big number of organizations across the globe. As this software provides a platform for educational organizations, it is mainly used by schools and universities. However, because of the COVID-19 pandemic, …

Read more

How Zero-Day Vulnerabilities Are Being Found?

How zero day vulnerabilities are being found

The majority of people associate zero-day vulnerabilities with a black hat, criminal hackers. Government agencies all across the globe, on the other hand, are equally eager in getting them, usually to use in surveillance or their own cyberattacks. In reality, the tremendous rivalry on both sides to be the first to know about zero-day vulnerabilities …

Read more

Best Gifts for Ethical Hackers

Best Gifts for Ethical Hackers

Coming up with a gift idea is always stressful. When there are many different holidays and occasions to give a present, it is not easy to be original every time. However, if you want to make a person happy, you should gift something in his or her area of interest. Today we are going to …

Read more

Why There is No IPV5?

Why there is no IPV5

In 1970, the Internet was only in its early stages. Several internet protocols were being developed to set a standard for internet usage and to control how information packets carrying large amounts of data should be sent over a network. Several internet protocols, such as IPv4 and IPv6, are being developed and deployed in the …

Read more