Two core developers of dSploit went separate ways in the fall of 2014. dSploit’s father merged it into the commercial zANTI 2 with ambition to build a series of security apps on Android platform. Meanwhile, the other founder (now cSploit‘s father) can’t wait the distant promise to open source of zANTI 2. Thus, he decided to fork the killed project and finish all the original dSploit To-Dos on a new core – cSploit, by himself.
Continue reading cSploit – Successor of dSploit, most powerful network penetration testing toolkit
The Web Application Hacker’s Handbook (WAHH for short), 2nd Edition is one of bible-level of security technology books with comprehensive, abundant and professional content highly recommended by AppNee. This second edition new added about 30% of content, mainly introduced new trends and a large number of new vulnerabilities in the field of Web security.
Continue reading The Web Application Hacker’s Handbook, 2nd Edition HD PDF
More and more critical applications have been migrated to websites now. Meanwhile, the security of these apps have become a major challenge to all kinds of institutions. Know yourself as well as the enemy, so that you can fight a hundred battles with no danger of defeat. Similarly, only by understanding the exploitable vulnerabilities exist in web applications and the attack methods adopted by web attackers, we can more effectively ensure the safety of our web apps.
Continue reading The Web Application Hacker’s Handbook, Second Edition HD PDF
Without any doubt, Wireshark (formerly called Ethereal) is currently the world’s most famous, foremost free and open source network packets capture & analysis tool. Its appearance puts an end to the future of all similar business software.
Continue reading Wireshark – World’s most popular interactive network traffic capturer and analyzer
First of all, about the author of this book “Johnny Long“, he has begun to research using Google to test the potential safety hazards of websites and computers as early as in 1995. What he does has developed and formed today’s Google Hacking Techniques – the Google Hacking Database (GHDB) set up by him has been hosted by Exploits-DB now.
Continue reading Google Hacking for Penetration Testers Volume 1 & 2 HD PDF