PowerShell For Pentesters Part 2: The essentials of PowerShell

PowerShell For Pentesters Part 2: The essentials of PowerShell

Introduction PowerShell represents one of the most interesting and powerful languages for a pentesting purpose as we explained in the first part of this lab series. For the first part of this series... Go on to the site to read the full article ... Read More
PowerShell For Pentesters Part 1: Introduction to PowerShell and Cmdlets

PowerShell For Pentesters Part 1: Introduction to PowerShell and Cmdlets

Introduction PowerShell represents one of the most interesting and powerful languages for a pentesting purpose. So, we will try to focus on this context with this suite of articles. This article... Go on to the site to read the full article ... Read More
Shodan and IoT: The Problem is here!

Shodan and IoT: The Problem is here!

Introduction Shodan a search engine which collects the information about all IPv4 and IPv6 devices connected to the internet and gives us the ability to search devices using filters that can be very... Go on to the site to read the full article ... Read More
Pentesting Mobile Applications with Burpsuite

Pentesting Mobile Applications with Burpsuite

| | Penetration Testing
Securing mobile applications is one of the most important issues today, especially with the continuing evolution of sophisticated cyber threats which are becoming very covert today. Thus, the... Go on to the site to read the full article ... Read More