linux server security

Linux Server Security

Welcome! I’m so glad you’ve decided to do the long but hugely rewarding job of learning how to properly Linux Server Security. The Internet as we know it from its inception has changed rapidly, and so have web applications. From features to performance and functionality, web applications have improved in every possible way. This in…

Read More
Xbox Resolver

Xbox Resolver

Xbox Resolver is a service that translates Xbox and PlayStation gamer tags or usernames into a legible IP format. Resolver Xbox, on the other hand, debuted in 2017 and is distributed under two different domain names, one for Xbox and the other for PlayStation. Players themselves save these IP records using an IP puller called…

Read More
Password Cracking

Password Cracking & Online Casino

Authentication is the first step to measuring the security of a website, computer, and network. Various websites use a password-based authentication process to keep their users safe, even if you use password-based protection for your bank account, poker account, email account. etc. | Password Cracking | Therefore, before you make a decision and enter a…

Read More
Wapiti –Web Applications Security Auditing Framework

Wapiti – Web Applications Security Auditing Framework

Wapiti is a vulnerability assessment framework that performs black box security auditing of the web applications. The vulnerabilities that can be assessed with Wapiti include database injections, Local File Inclusion (LFI), Remote File Inclusion (RFI), command execution, CRLF injection, Server Side Request Forgery (SSRF), XML External Entity (XXE) injection, Shellshock bugs, .htaccess attacks, and source…

Read More
pureblood tool

Pureblood Tool – web Application Penetration Testing

Pureblood  Information Gathering and Security Auditing Tool Pureblood is a Python tool that can be used during the information gathering and gaining access phases of penetration testing. Pureblood can collect useful information about target web applications, such as Banner grabbing, WHOIS record, DNS data, reverse DNS lookup, reverse IP lookup, CMS information, ports information, admin panel paths, subdomain scan…

Read More
Magecart group

New Magecart group uses an e-Skimmer that avoids VMs and sandboxes

A new Magecart group leverages a browser script to evade virtualized environments and sandboxes used by researchers. Malwarebytes researchers have spotted a new Magecart group that uses a browser script to evade detection and the execution in virtualized environments used by security researchers for threat analysis. Hacker groups under the Magecart umbrella continue to target e-stores to steal payment…

Read More