Encryption Wizard (EW) is a simple, strong, Java file and folder encryptor for protection of sensitive information (FOUO, Privacy Act, CUI, ...
Recon-ng Framework A Quick Intro
Recon-ng is an open-source framework coded in python by Tim Tomes a.k.a LaNMaSteR53. Its interface is modeled after the look of the Metasplo...
Extract metadata from file in Backtrack
Metadata is stored in any document by authoring application which can be user-name ; comment ;creation date;modification date.Metadata is ve...
Wordpress Pingback Port Scanner
WordpressPingbackPortScanner Wordpress exposes a so called Pingback API to link to other blogposts. Using this feature you can scan other ho...
List of vulnerability in wordpress 3.5.1.
Recently true-caller and Tango messenger is hacked by Syrian-Electronic-Army. And large amount of Database has been stolen. Now what is com...
Bypassing Cloudflare - Attack-Secure Challenge Writeup!
Few days back we setup a small and interesting challenge for RHA readers, the main goal of the challenge was to find the hosting provider a...
How to solve metasploit problem in SET?
If you installed metasploit from git repository then you donot face any problem with SET. But If you have installed metasploit from its bina...
Information Gathering Using FOCA
Last month I put some of tutorial on Information gathering which is first step of penetration testing , & today we will go ahead in thi...
Malware Not To Decrease Any Time Soon!
There are now more than 1 billion smartphone users around the world, many of whom are connected to always-live cloud services. While e-mail ...
Win A Free Shot At "Samurai Skills" Penetration Testing Course
Update: Winners Announced here Well, You might have already about " Attack-Secure Real World Penetration testing course ", The co...
Firefox Add-ons for penetration testers
In this brief post, we are listing a few popular and interesting Firefox add-ons that are useful for penetration testers. These add-ons vary...
Open source Information Gathering tool-Maltgo
Maltego is an open source intelligence and forensics application. It allows you to mine and gather information, and represent the informati...
Information Gathering using Public Resources
On the Internet, there are several public resources that can be used to collect information regarding a target domain. The benefit of using ...
Launching Our Penetration Testing Services
For past couple of months there has been a significant increase in the freelance security testing projects we were doing here at RHA. Howeve...
Exploit for Java version 7u21 and earlier
Java Applet ProviderSkeleton Insecure Invoke Method:- This module abuses the insecure invoke() method of the ProviderSkeleton class that all...
How to exploit Directory traversal vulnerability?
Backtrack has lots of tools for web-application testing. Directory traversal is one of the critical vulnerability in web-application. Previo...
Exploit HP sytem managment
There are two modules available for exploitation of hp system management. (1)HP System Management Anonymous Access Code Execution This modu...
CIsco Global Exploter
Cisco Global Exploiter (CGE), is an advanced, simple and fast security testing tool/ exploit engine, that is able to exploit 14 ...