Top Three Web Based Image Editors

If you are using a computer that doesn't have a decent image editor program, then you can make use of a variety of web-based image editors. Having surveyed those that are freely available, I present a list of the top three. Each of these alows you to...

ESF Exploit Next Generation® SQL Fingerprint™

SQL Server fingerprinting can be a time consuming process. It involves a lot many trial and error methods to fingerprint the exact SQL Server  version. Intentionally inserting an invalid input to obtain a typical error message or using certain alphabets that are unique for a certain server are...

OWASP Zed Attack Proxy Project

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who a new to penetration testing. ZAP...
 
 
Blogger Templates