Pen Test Tools

Pen Test Tools

Burp Suite Knockpy HostileSubBruteforcer sqlmap Nmap Eyewitness Shodan What CMS Nikto Recon-ng idb Wireshark Bucket Finder Google Dorks IPV4info.com JD GUI Mobile Security Framework Firefox Plugins: FoxyProxy UserAgentSwitcher Firebug Hackbar Websecurify CookieManager+ XSS Me Offsec Exploit-db Search Wappalyzer

Set Up CloudFlare Workers to Use Your Own Domain

Set Up CloudFlare Workers to Use Your Own Domain

CloudFlare is the world’s leading provider of CDN solutions and domain name registration resolution solutions, and Workers is a serverless application based on its powerful CDN global cloud network. Having previously shared the List of Google Drive and OneDrive File Lists on platforms such as CloudFlare Workers, the long domain name created by this method is not …

Set Up CloudFlare Workers to Use Your Own Domain Read More »

One Method to Crack Websites Prohibiting Copy and Paste

One Method to Crack Websites Prohibiting Copy and Paste

First of all, we need to know that the function of prohibiting copy and paste on a website is generally implemented by JS. It is usually implemented by the following statement: var bodyMain = document.getElementById (‘bodyMain’); // prohibiting copy and paste setting is FALSE bodyMain.oncopy = function(){ return false; } // prohibiting copy and paste setting …

One Method to Crack Websites Prohibiting Copy and Paste Read More »

Understanding Ponemon Report: How much does SOC cost?

Understanding Ponemon Report: How much does SOC cost?

In January 2020, Ponemon released a research report entitled “The Economics of SOC: How Much Will It Take to Get Results”. Surveys have shown that SOCs are expensive and average, but significant . Based on 637 valid questionnaires [the geographical area is not mentioned in the article, the author estimates that the respondents are mainly in North …

Understanding Ponemon Report: How much does SOC cost? Read More »

Annual note on terminal security operations

Annual note on terminal security operations

This article shares the security operations of more than 10,000 terminals in a large enterprise from 0 to 1, which improves the installation rate, normal rate, and compliance rate to the extreme. As companies attach more and more importance to the difficulty of mining server and application vulnerabilities, there is a post on the website ” Now websites …

Annual note on terminal security operations Read More »