>_ Case Files
Browse the full archive. Every breach dissected. Every exploit explained. Every case filed.
Showing 1-8 of 8 cases
Nmap: The First Tool Every Hacker Runs
Nmap is the most iconic network scanner in cybersecurity. It's the first tool in every penetration tester's toolkit and ...
Metasploit: Thousands of Exploits, Completely Free
Metasploit is the world's most popular penetration testing framework. Thousands of exploits, hundreds of payloads, and a...
Wireshark: See Every Packet on Any Network
Wireshark is the world's most popular network protocol analyzer. It lets you capture and inspect every single packet flo...
Burp Suite: Break Any Web App
Burp Suite is the go-to tool for web application security testing. It intercepts, modifies, and replays HTTP traffic bet...
Aircrack-ng: Crack Any WiFi Password
Aircrack-ng is the most widely used WiFi security testing suite in the world. It can capture handshakes, crack WPA/WPA2 ...
Hydra: The Brute Force Tool That Works on Everything
Hydra is the most versatile brute-force login cracker in cybersecurity. SSH, FTP, HTTP, RDP, MySQL, SMB — if it has a ...
John the Ripper: The Password Cracker Older Than You
John the Ripper is one of the oldest and most powerful password cracking tools in existence. First released in 1996, it ...
SET: The Tool That Hacks Humans, Not Computers
The Social Engineering Toolkit (SET) automates the most dangerous attacks in cybersecurity — the ones that target peop...