• Scanning for vulnerabilities in a network.

    Greetings everyone. I need to carry out vulnerability identification and mapping work on all assets on a network. The tool needs to be free, initially, as it is an x-ray of the network, to deliver a report to the client. The best recommendation I…
  • AVGator

    I was reading about a new vulnerability in AV programs, AVGator. In short, the attack works like this: A malicious file is delivered to the host, the AV catches the malicious file and quarantines the file, the attacker manipulates NTFS to restore the…