A fast and customisable vulnerability scanner powered by simple YAML-based templates| docs.projectdiscovery.io
You would be surprised at what people leave unprotected on a web server. An initial step in attacking a web application is Recon, and part of that entails| HackerTarget.com
Use Docker to get started with Zeek, including GeoIP, ASN and JA4 fingerprints. A quick way to get up and running with a practical use case.| HackerTarget.com
0 MD5 8743b52063cd84097a65d1633f5c74f5 | hashcat.net
Burp Suite Community Edition is PortSwigger's essential manual toolkit for learning about web security testing. Free download.| portswigger.net
SQL Injection on the main website for The OWASP Foundation. OWASP is a nonprofit foundation that works to improve the security of software.| owasp.org
The OWASP Top 10 is the reference standard for the most critical web application security risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing your software development culture focused on producing secure code.| owasp.org
In this Snort tutorial you will not only get started with this powerful tool but also find practical examples and immediate use cases.| HackerTarget.com