Practical tips and audit approach for performing Security Assessments.
The documentation provides efficient approach, commands and examples for performing security assessment by using Kali Linux distribution and additional resources. The resources can be exported from the application to SD card.
Application contains the following modules:
Author selected the methods based on own experiences in Security Industry with focus on providing fast and effective way of finding the vulnerabilities in IT systems and corporate networks.