How to turn on System Restore in Windows 10 to protect against bad updates

We’ve already talked a few times about Microsoft’s new approach to delivering updates for home users in Windows 10. Unlike previous versions of the OS, Home users won’t be able to prevent updates from being installed on their PC. While this is probably advantageous for most people it does bring up two major objections: fears […]

Read More


Brakeman is an open source vulnerability scanner specifically designed for Ruby on Rails applications. It statically analyzes Rails application code to find security issues at any stage of development. If you happen to use the Hudson/Jenkins continuous integration tool, there is a Brakeman plugin for it. Our Reader Score[Total: 0 Average: 0]You must be logged […]

Read More

OWASP Zed Attack Proxy

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. Our Reader Score[Total: 0 […]

Read More


Vega is a GUI-based, multi-platform, free and open source web security scanner that can be used to find instances of SQL injection, cross-site scripting (XSS), and other vulnerabilities in your web applications. Vega also includes an intercepting proxy for interactive web application debugging. Vega attack modules are written in Javascript, users can easily modify them […]

Read More

Knock Subdomain Scan

Knock allows you to scan subdomains, Transfer Zone discovery, Wildcard testing with internal or external wordlist. This tool can be useful in black box pentest to find vulnerable subdomains. Our Reader Score[Total: 0 Average: 0]You must be logged in to vote.

Read More


nsiqcppstyle is aiming to provide an extensible, easy to use, highly maintainable coding style checker for C/C++ source code. The rules and analysis engine are separated and users can develop their own C/C++ coding style rules. Furthermore, there is a customizable rule server(Google App Engine or dJango based) as well. This project is developed to […]

Read More

Babel Enterprise

Babel Enterprise manages the risk, dividing it by domains (groups or organizations), assets and policies. With all this, it can be checked, point by point the fully compliance of a security regulation, such as UNE-ISO/IEC 27001 or other ones that depend on this such as LOPD, SOX, etc. Our Reader Score[Total: 0 Average: 0]You must […]

Read More

Do NOT follow this link or you will be banned from the site!