Results for pentesting

Add to feed Create your own feed

Latest

Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis

@UPS showed up today with some awesome new reading material. #tribeofhackers  #redteam  #cybersecurity  #pentesting 

tweet picture

Hey security peeps, if you were going to buy a laptop for pentesting, CTFs, running VMs, etc. and you could only choose one of these, would you go with:

Join us on August 5, 2019 to learn about pentesting cars, how the CAN bus in your own car works, plus security consulting services the Cisco CX APT can provide.

tweet picture

Join us tomorrow to learn about pentesting cars, how the CAN bus in your own car works, plus security consulting services the Cisco CX APT can provide.

tweet picture

Join us on August 13, 2019 to learn about pentesting cars, how the CAN bus in your own car works, plus security consulting services the Cisco CX APT can provide.

tweet picture

blaCCkHatHacEEkr/PENTESTING-BIBLE: ethical hacking & penetration testing & red team & cyber security & computer science resources

Listening to @DarknetDiaries  with @HydeNS33k  telling her stories on physical pentesting. Because of her I will now pay EXTRA attention to any pregnant woman badging in! LOL! 😂

Loading
Loading

Most relevant

Moreover, Commando VM could also be used to set up a pentesting environment on the base machine running Windows OS. It's not mandatory to run Commando VM script only on a VM-based Windows OS to get hacking tools installed. Updated Article

Vulnerability disclosure vs Pentesting vs Bug Bounty Programs. However 94% of Forbes Global 2000 have published no ways to report #cybersecurity  vulnerability. at #TheSAS2019 

tweet picture

Want to use Windows for pentesting instead of Linux variants like or ? just announced Commando VM: The First of Its Kind Windows Offensive Distribution

Bug in Cobalt Strike pentesting tool used to identify malicious servers - - #pentest  #redteam 

tweet picture

Learn why pentesting is crucial to the DoD and what they look for in professionals during a free webinar at 2 p.m. EST tomorrow featuring hosted by . Register:

A new pen-testing tool called Modlishka can defeat two-factor authentication in the latest 2FA #security  issue. Do you think #2FA  is broken? Weigh in below.

tweet picture

Why our @0xtosh  carries a thermal camera with him, while doing pentesting.

tweet picture

"Pentesting" involves an authorized, simulated attack on a network to evaluate its security. Cyber exercises between #USArmy  and community are mutually beneficial for national security. Learn why:

tweet picture

CrackMapExec (CME) Post-Exploitation Tool: A Swiss Army Knife for Pentesting Networks (developed by )

tweet picture

Loading
Loading