Crunch is a wordlist generator useful for password cracking. Sometimes, you don’t want to use large precomputed wordlists and instead you may want to create your own. Crunch is your solution! It is a small but powerful command line tool allowing you to specify the criteria for the wordlists and generate it for you.
Sublist3r is an information gathering tool written in python for subdomain enumeration. This tool uses OSINT or Open Source Intelligence to gather information from various search engines such as Google, Yahoo, Baidu, Bing and so on. The tools is available on GitHub which can be setup by cloning the git repository as below:
cURL doesn’t stand for command line URL tool but it is one of the tools available for transferring of files seamlessly through the terminal. cURL is considered an abbreviation for Client URL Request Library. cURL supports multiple network protocols allowing to access files through HTTP(S), FTP(S), SCP to name a few.
Hak5 is one of the shows/site that I have been following for years. They have been building great tools for the Infosec community since 2005. The famous USB Rubber Ducky, a USB device that mimics a keyboard and enters commands lightning fast, is one of the many products from Hak5 .
The information security industry has plenty of recognised certifications. At one point or another, you’ll come across a situation where you have to obtain a security certification. It could either be to enhance your knowledge or as a requirement for a particular job that you are aspiring for. Doing an online research for pursuing a security certification, I came across SkillSet , a website that offers thousands of practice questions for some of the most commonly recognised security certifications.
A great application for newcomers as well as for the experienced to learn more about various cryptographic protocols and algorithms. CrypTool provides an intuitive graphical interface to play around with various settings of any cryptographic algorithm. Using the tool, one can understand the importance of key length and choice of characters for any encryption scheme.
All about Me
Hello there, Thank you for stopping by! 😌 I intend to share my thoughts and learning here to help anyone learn something new or to look at a particular subject from a different perspective. 🧐 “In learning you will teach, and in teaching you will learn.” ― Phil Collins