unknowndevice64 – Boot2Root CTF Write-Up

Intro This will be a walkthrough of unknowndevice64, a boot2root CTF Virtual Machine available on VulnHub. Boot2root CTFs are a good platform to learn web application, network, and operating system penetration testing, all in one place. Many of these virtual machines will have vulnerabilities which can be found in real-life scenarios, thus educating you with … Read moreunknowndevice64 – Boot2Root CTF Write-Up

Now read exploit news from Kruptos website

We have been busy during the holidays doing small researches and publishing tools. Last week we published the IP_InfoV1, an IP OSINT tool which gives blacklist details of particular IP. Today we have made a portal where one can read about the recent Exploits which has happened. Here is the link to the website. The … Read moreNow read exploit news from Kruptos website

First minimal IP OSINT tool from Kruptos.club

We’re happy and proud to publish our first ever tool. From our experiments and research we made a small yet powerful and useful abuse IP information tool. The tool is powered by AbuseIPDB which stores abuse information of IPs under different categories. Using the APIv1 we have made our IP_Info V1 tool and is now … Read moreFirst minimal IP OSINT tool from Kruptos.club

Beta Version of Kruptos.club website now made public

We are happy to announce that Kruptos Security Club will host a refreshed website design with lots of surprises packed inside after a year when we updated our portfolio. Today we’ve launched the first public beta version and is available at https://beta.kruptos.club for viewing. We’re continuously working on the website to improve performance and security.  As mentioned … Read moreBeta Version of Kruptos.club website now made public

Network Mapping Using Nmap

Network Mapping is a process by which the devices on the network and their connectivity types can be discovered. It is very important for network engineer as well as a penetration tester or a hacker to know this tool. The most preferred way of mapping is using Nmap. What is Nmap? “Nmap is a security … Read moreNetwork Mapping Using Nmap

Introduction And Getting Started into Bug Bounty

Most of you might be hearing the term Bug-Bounty the very first time! What is bug bounties? What are the benefits of bug bounties? And how to get successfully into bug bounties? The answers to these questions are answered in this post in detail. What is bug bounty? It is a program run by websites … Read moreIntroduction And Getting Started into Bug Bounty

How much should you really invest for an antivirus?

The most common question that every windows user would ask me is, “How much should I invest for an antivirus software?” There’s no point in saying that you don’t need an antivirus, but there are so many choices, free versions, cheap ones, costly ones…. Which one to choose? It all depends on what your need … Read moreHow much should you really invest for an antivirus?

Just a week into 2018, four cyber attacks already

It’s been a week into 2018, and here we have four major cyber security breaches. From Aadhaar details getting compromised to fake apps stealing banking data, 2018 has presented us with four large scale cyber attacks which potentially affect millions, even billions of people. Here’s a quick read of the 4 attacks……. Aadhaar data access … Read moreJust a week into 2018, four cyber attacks already

Bypassing App Lock on any Android device

With rapid growth of android smartphone industries, the number of android smartphone users are increasing on fast scale. With growing digital trend, the security of these devices are highly essential as all your data is stored in your phone. Spying others phone is also easy. Suppose you have a lot a private, confidential, personal photos … Read moreBypassing App Lock on any Android device