rm -rf pic* Are you sure? Are you one hundred percent sure? … allows you to run a command and...
QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login with QR...
Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the...
SSMA is a simple malware analyzer written in Python 3. Features: Searches for websites, e-mail addresses, IP addresses in the strings of...
A Python open source toolkit that helps you find malicious, hidden and suspicious PHP scripts and shells in a chosen destination, it...
Information security awareness training may include several demo that describe how attacker may exploit vulnerabilities on system to gain full control on...
Creating a malicious application is becoming easier by using some tools. Users of this shell script should have working knowledge of Linux,...
Serpico is a penetration testing report generation and collaboration tool. It was developed to cut down on the amount of time it...
Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities. It is intended to...
One of the tools NCC Group released at this year’s Black Hat Arsenal is BinProxy, a tool for understanding and manipulating binary network...
This presentation demonstrates how an attacker can utilise XSS to execute arbitrary code on the web server when an administrative user inadvertently...
LOG-MD was designed for Windows based systems to audit log and advanced audit policy settings and guide users to enable and configure...
This tool will perform an NMap scan, or import the results of a scan from Nexpose, Nessus, or NMap. The processesd results...
Brutal is extremely useful for executing scripts on a target machine without the need for human-to-keyboard interaction ( HID -ATTACK )...
Faraday introduces a new concept – IPE (Integrated Penetration-Test Environment) a multiuser Penetration test IDE. Designed for distribution, indexation and analysis of...
Deny navigation and download capabilities of a target host in the local network performing an ARP poison attack and sending reset TCP...
PirateBox creates offline wireless networks designed for anonymous file sharing, chatting, message boarding, and media streaming. You can think of it as...
CrackMapExec is your one-stop-shop for pentesting Windows/Active Directory environments! From enumerating logged on users and spidering SMB shares to executing psexec style...
Lynis is a security auditing for UNIX derivatives like Linux, macOS, BSD, and others. It performs an in-depth security scan and runs...
Are you sure that you can detect an APT malware? YES or NO, whichever, try ShinoBOT; this is a BOT or RAT...
Needle is an open source, modular framework to streamline the process of conducting security assessments of iOS apps. Description Assessing the security...