Docker Installation & Configuration

Docker services are extensively used in IT operations, so it

Apache Tomcat Penetration Testing Lab Setup

In this article, we will learn the process of installing

WordPress: Reverse Shell

This post is related to WordPress security testing to identify

UPDATE: Kali Linux 2019.3 Release

Kali Linux 2019.3, the latest and the greatest Kali Linux release

UPDATE: Merlin v0.8.0

A week ago an update – Merlin v0.8.0 was released.


A month ago, MITRE Caldera 2.2.0 was released and a

Dradis: Reporting and Collaboration Tool

Hello friends, today in this article we are going to

UPDATE: Nmap 7.80

Good news guys! The Nmap 7.80 update is now available


If you remember, I wrote briefly about this automated adversary

List of Open Source C2 Post-Exploitation Frameworks

This post has been lying in my drafts for more

Comprehensive Guide to Steghide Tool

In this article, we’ll learn about Steghide. There are various

Drupal (SA-CORE-2019-008) Wordspaces Extension Access Bypass PoC

Last week, an advisory (SA-CORE-2019-008) addressing a Drupal access bypass

ExifTool : A Meta-Data Extractor

In this article, we’ll discover various methods to read, write


In this article, we will learn to use EvilOSX tool

Retina: A Network Scanning Tool

In this article, we will learn how to use retina,

Shellphish: A Phishing Tool

Shellphish is an interesting tool that we came across that

Beginner’s Guide to Nexpose

In this article, we’ll learn about Nexpose, which is used

Penetration Testing on Splunk

In this article, we are going to exploit SPLUNK using