STENGE

Hardware | Software | Code

  • INDEX

  • ABOUT

  • CONTACT

  • More

    • All Posts
    • Cisco
    • Juniper
    • Others
    • Huawei
    • Codes
    • Hardware
    • A10
    Search
    Diniz Martins
    • 5 days ago

    NMAP | Essential Commands

    Nmap or Network Mapper is undoubtedly the best reconnaissance tool used by modern penetration testers. This open-source application has...

    170
    Diniz Martins
    • Apr 6

    Directory Scanner Enumeration

    Directory Scanner is the free Directory Server fingerprinting tool. It can help you to remotely detect the type of Directory servers...

    120
    Diniz Martins
    • Apr 2

    FMC | Security Intelligence Blacklisting

    As a first line of defense against malicious Internet content, the Firepower System includes the Security Intelligence feature, which...

    210
    Diniz Martins
    • Mar 8

    A10 | Packet Capture

    This article will help you how we can perform packet capture in A10 Loadbalancer. While troubleshooting some issues sometimes we require...

    260
    Diniz Martins
    • Mar 4

    AnyConnect | XML

    The mostly used VPN software from Cisco is probably Cisco AnyConnect Secure Mobility Client and it is a pretty sharp tool. The simple...

    280
    Diniz Martins
    • Feb 24

    JARM: A Solid Fingerprinting Tool for Detecting Malicious Servers

    JARM is an active Transport Layer Security (TLS) server fingerprinting tool. JARM fingerprints can be used to: Quickly verify that all...

    170
    Diniz Martins
    • Feb 22

    Robots.txt

    Robots.txt is a text file with instructions for search engine crawlers. It defines which areas of a website crawlers are allowed to...

    210
    Diniz Martins
    • Feb 18

    Sudo and CVE-2021-3156

    Sudo stands for SuperUser DO and is used to access restricted files and operations. By default, Linux restricts access to certain parts...

    240
    Diniz Martins
    • Feb 11

    Zabbix | Install

    Zabbix is an open-source monitoring software tool for diverse IT components, including networks, servers, virtual machines and cloud...

    210
    Diniz Martins
    • Feb 6

    Wafw00f + Nmap

    Web application firewalls (WAF) are one of the strongest defenses a web app has, but they can be vulnerable if the firewall version used...

    310
    Diniz Martins
    • Jan 28

    Cisco Nexus NX-OS tips and tricks

    The Cisco Nexus series switches are modular and fixed port network switches designed for the data center. Cisco Systems introduced the...

    410
    Diniz Martins
    • Jan 11

    Installing Cisco ISE

    The Cisco Identity Services Engine (ISE) is a next-generation identity and access control policy platform that provides a single policy...

    210
    Diniz Martins
    • Jan 5

    BF | Brainfuck

    Brainfuck is an esoteric programming language created in 1993 by Urban Müller. Notable for its extreme minimalism, the language consists...

    170
    Diniz Martins
    • Dec 28, 2020

    Napalm | Network Automation

    Napalm is a vendor neutral, cross-platform open source project that provides a unified API to network devices, is written in Python and...

    230
    Diniz Martins
    • Dec 22, 2020

    G00gle Dorks | Vulnerable Services

    Google serves some 80 percent of all search queries on the Internet, making it by far the most popular search engine. Its popularity is...

    610
    Diniz Martins
    • Dec 17, 2020

    OpenSSH via PowerShell

    This is an alternative to connect to a server via SSH without leaving PowerShell or Command Prompt. ◼️ Free download HERE ◼️ #1 Download...

    250
    Diniz Martins
    • Dec 15, 2020

    Vega | Web Security Scanner

    Vega is a free and open source web security scanner and web security testing platform to test the security of web applications. It can...

    360
    Diniz Martins
    • Dec 13, 2020

    Windows | OpenStego

    What is Steganography? Steganography is the science of hiding secret message inside another larger and harmless looking message. This is...

    170
    Diniz Martins
    • Dec 8, 2020

    Search for Geolocation Vulnerabilities

    Have you ever imagined that you can detect security flaws at an ATM near where you are? Here you have an example of it. #1: Find your...

    330
    Diniz Martins
    • Dec 4, 2020

    Disable weak cipher and TLS on CISCO FMC

    Transport Layer Security, or TLS, is a widely adopted security protocol designed to facilitate privacy and data security for...

    770
    Diniz Martins
    • Nov 30, 2020

    Admin-Scanner

    This tool is design to find Admin Panel of any website by using custom wordlist or default wordlist easily. Grab the result and paste to...

    300
    Diniz Martins
    • Nov 25, 2020

    D-TECT | Pentest the Modern Web

    D-TECT is a penetration testing tool that can be used for information gathering and finding vulnerabilities in web applications. The...

    340
    Diniz Martins
    • Nov 17, 2020

    IOS-XR | CVE-2020-26070

    A high-severity flaw in Cisco’s IOS XR software could allow unauthenticated, remote attackers to cripple Cisco Aggregation Services...

    300
    Diniz Martins
    • Nov 13, 2020

    Downloads - #1

    Here you have some amazing Windows files to celebrate the first year of STENGE.info. Enjoy it! ➟ HJSplit - Program that can split a file...

    450
    1
    234