Penetration testing

Top 10 security tools for bug bounty hunters

Bug bounty hunting is a career that is known for the heavy use of security tools. Here are 10 you should know.

Kali Linux: Top 5 tools for post exploitation

You can use these five tools to explore post exploitation when performing penetration testing or hacking.

Kali Linux: Top 5 tools for database security assessments

These Kali Linux tools can help you assess just how secure your database is.

Kali Linux: Top 5 tools for information gathering

Information gathering is one of the most important phases in a penetration test that you can use via Kali Linux’s extensive tool suite.

Kali Linux: Top 5 tools for sniffing and spoofing

Sniffing and spoofing network traffic can help protect your organization from potential attacks.

Kali Linux: Top 5 tools for penetration testing reporting

Use these Kali Linus tools to perform a penetration test and gather crucial reporting.

Kali Linux overview: 14 uses for digital forensics and pentesting

Learn more about Kali Linux forensics and pentesting.

Explore Python for MITRE ATT&CK persistence

Persistence is important to protect a penetration tester’s access against remediation attempts. Python can be used for persistence in a variety of ways.

Explore Python for MITRE ATT&CK defense evasion

Python can impair defenses like antivirus software and hide malicious code from detection. Learn how.

Explore Python for MITRE ATT&CK privilege escalation

Python is used to achieve privilege escalation, a common goal of penetration testers looking to expand and increase their access to a compromised network.