Homepage
Open in app
Sign in
Get started
Pentest-Tools.com
Get a hacker’s perspective on your web apps, network, and cloud. Pentest-Tools.com helps security teams run the key steps of a penetration test, easily and without expert hacking skills.
Follow
We think we know how to build differentiating skills in offsec
We think we know how to build differentiating skills in offsec
There’s a constant loop of learning, doing, and improving in offensive security. And one way to develop the “muscle” to tackle complex…
Mario Popescu
May 14
Offensive security pros share how ChatGPT impacts their work
Offensive security pros share how ChatGPT impacts their work
Could 2024 be a pivotal moment for AI in offensive security?
Mario Popescu
May 14
CVE-2024–3094 — The XZ Utils Backdoor, a critical SSH vulnerability in Linux
CVE-2024–3094 — The XZ Utils Backdoor, a critical SSH vulnerability in Linux
Context
Mario Popescu
May 14
How to exploit the DotNetNuke Cookie Deserialization
How to exploit the DotNetNuke Cookie Deserialization
We looked at around 300 DotNetNuke deployments in the wild and discovered that one in five installations was vulnerable to CVE-2017–9822…
Ioana Daniela Rijnetu
Jun 16, 2020
How to exploit the PHAR Deserialization Vulnerability
How to exploit the PHAR Deserialization Vulnerability
Deserialization vulnerabilities have been a topic of interest for the research community for more than a decade now. Every year, new…
Ioana Daniela Rijnetu
Jun 2, 2020
Pentest-Tools.com Offers Free Website Pentest Services to Organizations Fighting COVID-19
Pentest-Tools.com Offers Free Website Pentest Services to Organizations Fighting COVID-19
Our top priority is helping our customers become resilient against cyberattacks, even more so in critical times.
Ioana Daniela Rijnetu
Mar 27, 2020
How to detect SMBGhost and GhostCat vulnerabilities with Pentest-Tools.com
How to detect SMBGhost and GhostCat vulnerabilities with Pentest-Tools.com
We are happy to inform you that we have two new scanners on the platform, which detect two recent and critical vulnerabilities.
Ioana Daniela Rijnetu
Mar 17, 2020
How to simulate phishing attacks with the HTTP Request Logger
How to simulate phishing attacks with the HTTP Request Logger
As a penetration tester or a Red Team security consultant, you probably deal with lots of challenges when you want to simulate phishing…
Ioana Daniela Rijnetu
Feb 21, 2020
New Tool for Detecting the Critical Citrix RCE Vulnerability (CVE-2019–19781)
New Tool for Detecting the Critical Citrix RCE Vulnerability (CVE-2019–19781)
To help our customers assess the security of their Citrix ADC and Citrix Gateway devices, we, at Pentest-Tools.com, have added a new tool…
Ioana Daniela Rijnetu
Jan 15, 2020
How to detect the SACK Panic vulnerability with Wireshark
How to detect the SACK Panic vulnerability with Wireshark
Our security researchers have recently performed an in-depth analysis of the SACK Panic vulnerability (which was first disclosed in June…
Ioana Daniela Rijnetu
Jan 10, 2020
About Pentest-Tools.com
Latest Stories
Archive
About Medium
Terms
Privacy
Teams