Archive for the ‘vulnerability assessment tools’ Category

Katyusha Scanner — Telegram-based Fully Automated SQL Injection Tool

July 12th, 2017

A new powerful hacking tool recently introduced in an underground forum is making rounds these days, allowing anyone to rapidly conduct website scans for SQL injection flaws on a massive scale — all controlled from a smartphone using the Telegram messaging application.

Dubbed Katyusha Scanner, the fully automated powerful SQLi vulnerability scanner was first surfaced in April this year when a

Posted in database hacking, hacking tool download, Penetration testing tools, SQL injection, SQL injection attack, sql injection tool, vulnerability assessment tools, windows hacking tool | Comments (0)

DARPA Challenges Hackers to Create Automated Hacking System — WIN $2 Million

July 14th, 2016

Why we can’t detect all security loopholes and patch them before hackers exploit them?

Because… we know that humans are too slow at finding and fixing security bugs, which is why vulnerabilities like Heartbleed, POODLE and GHOST remained undetected for decades and rendered almost half of the Internet vulnerable to theft by the time patches were rolled out.

Now to solve this hurdle, DARPA

Posted in automated penetration testing, capture the flag, DARPA, def con hacking conference, hacking competition, hacking conference, Penetration testing tools, vulnerability assessment, vulnerability assessment tools | Comments (0)

Yahoo! Launches Free Web Application Security Scanner

September 26th, 2015

Yahoo! has open-sourced Gryffin – a Web Application Security Scanner – in an aim to improve the safety of the Web for everyone.

Currently in its beta, Project Gryffin has made available on Github under the BSD-style license that Yahoo! has been using for a number of its open-sourced projects.

Gryffin is basically a Go & JavaScript platform that helps system administrators scan URLs for

Posted in Gryffin, hacking tool, Penetration testing tools, Scanning tool, vulnerabilities scanner, vulnerability assessment tools, Vulnerability Scanning, Web Application Security Scanner | Comments (0)

Cybrary Offers Free Online Ethical Hacking and Cyber Security Training

April 15th, 2015

I frequently receive emails and messages on how to hack my friend’s Facebook account, how to become a hacker, how to penetrate networks, how to break into computers, and how to compromise routers?

These are some of the most frequent queries I came across, and in this article I’ll attempt to answer these along with a solution on how to get started as a beginner. Before we begin, first let’s

Posted in automated penetration testing, cyber security awareness training, Cyber Security Certifications, Cyber Security University, Online IT Training Courses, vulnerability assessment tools | Comments (0)