Newer version John the Ripper 1.7.9-jumbo-6 was made available! This is a “community-enhanced” version, which includes many contributions ...

another Blog on Information Security | Network Security | Tips and Tricks | Sharing is Caring | Search,Learn,Share |
Newer version John the Ripper 1.7.9-jumbo-6 was made available! This is a “community-enhanced” version, which includes many contributions ...
WATOBO is intended to enable security professionals to perform highly efficient (semi-automated ) web application security audits. We are...
Linux Mint 13 “Maya” Xfce RC released! It a great news for those who love Linux. Linux mint is open source Linux OS . It is debian type dist...
Artillery: Powefull Linux Protection tool Artillery is a combination of a honeypot, file monitoring and integrity, alerting, and brute fo...
Clonezilla is a partition or disk clone tool similar to Norton Ghost®. It saves and restores only used blocks in hard drive. Two types o...
Oracle has announce the general availability of Oracle Linux 6.3 for x86 (32 bit) and x86_64 (64 bit) architectures. Oracle Linux 6.3 s...
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking o...
The Mole is an automatic SQL Injection exploitation tool. All you need to do is provide a vulnerable URL and a valid string on the site you ...
WebVulScan is a web application vulnerability scanner. It is a web application itself written in PHP and can be used to test remote, or ...
Web Application Security Check List is a documentation project of OWASP Turkey. It provides 61 security controls that need to be integrat...
Zenoss Core is an open source IT monitoring product that delivers the functionality to effectively manage the configuration, health, pe...