Category General

Releasing the RunModule brand!

RunModule blog was created in 2009 as a personal blog hosted at the University of Salamanca. The blog did not have this name yet, but my own. Today I have given the blog its own domain and brand and migrated…

How to make screenshots in Ubuntu

This post summarizes how to make screenshots in Ubuntu OS. How to make screenshots in Ubuntu 22.04 Copy the whole screen to the clipboard Press keys Shift + PrtSc (Print Screen). Copy a region of the screen to the clipboard…

netcat Syntax

      Examples nc -l -p 2222 | nc 10.1.0.43 1234 Netcat will listen on port 2222 and output anything received to a remote connection on 10.1.0.43 port 1234

List of IoT Information Gathering Tools

List of IoT Information Gathering Tools Shodan Shodan is a search engine that provides information about all the internet connected devices such as routers, traffic lights, CCTV cameras, servers, smart home devices, industrial devices, etc. Attackers can make use…

IoT Vulnerability Scanner Tools

This post features some IoT vulnerability scanner tools. List of IoT Vulnerability Scanner Tools List of IoT vulnerability scanner tools: nmap nmap official website Foren6 Foren6 uses sniffers to capture 6LoWPAN traffic and renders the network state in a graphical…

List of Bluetooth Security Tools

Bluetooth Firewall FruitMobile Bluetooth Firewall protects your android device against all sorts of bluetooth attack from devices around you. It displays alerts when bluetooth activities occur. You can also scan your device and detect apps with bluetooth capabilities. Bluediving…

List of Wi-Fi Predictive Planning Tools

AirMagnet Planner Source: Cisco Prime Infrastructure ( AirTight Planner ( LANPlanner ( RingMaster Software ( Ekahau Site Survey (ESS) ( Connect EZ Turnkey Wireless LAN Bundle ( TamoGraph Site Survey ( NetSpot ( Wi-Fi Designer (

Wi-Fi Security Auditing Tools

Cisco Adaptive Wireless IPS Source: Cisco Adaptive Wireless Intrusion Prevention System (IPS) offers advanced network security for dedicated monitoring and detection of wireless network anomalies, unauthorized access, and RF attacks. Fully integrated with the Cisco Unified Wireless Network, this…