Metasploit was created by H. D. Moore in 2003 as a portable network tool using Perl. By 2007, the Metasploit Framework had been completely rewritten in Ruby. On October 21, …
Kali Linux 2.0
-
How toKali LinuxScanningSecurity
Scan website for vulnerabilities in Kali Linux using Grabber
by blackMOREby blackMOREGrabber is a web application scanner. Basically it detects some kind of vulnerabilities in your website. Grabber is simple, not fast but portable and really adaptable. This software is designed …
-
How toKali LinuxScanningSecurity
Scan website for vulnerabilities in Kali Linux using Uniscan
by blackMOREby blackMOREUniscan is a simple Remote File Include, Local File Include and Remote Command Execution vulnerability scanner. It’s a very simple yet quite powerful tool to scan website for vulnerabilities in …
-
Denial-of-Service Attack (DoS)How toKali LinuxLinuxSecurity
Free DoS Attack Tools
by blackMOREby blackMOREShort for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Many DoS attacks, …
-
Desktop ManagersHow toKali LinuxLinux
Install MATE Desktop in Kali Linux 2.x (Kali Sana)
by blackMOREby blackMOREMATE is a fork of GNOME 2. It provides an intuitive and attractive desktop environment using traditional metaphors for Linux and other Unix-like operating systems. MATE has forked a number …