researchip

host discovery

In this article you will learn several active and stealth techniques used to discover even highly cloaked hosts. Read more.

port scanning

Discovering open ports on a networked system is an important reconnaissance step used to enumerate potentially vulnerable services. In this article you will learn a number of techniques used to perform fast and reliable port scans while bypassing many trivial defenses. Read more.



π
///\oo/\\\