
Top Twenty Most Exploited Vulnerabilities in 2021
The number of vulnerabilities in 2021 have dramatically increased so that the technical teams in charge of the patch management find themselves drowning in a myriad of critical and urgent task
OWASP ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library that makes it easier for programmers to write lower-risk applications. The ESAPI for Java library is designed to make it easier for programmers to retrofit security into existing applications. ESAPI for Java also ...
INSECT Pro is a penetration security auditing and testing software solution designed to allow organizations of all sizes mitigate, monitor and manage the latest security threats vulnerabilities and implement active security policies by performing penetration tests across their infrastructure and applications. INSECT can help to build a strong security posture ...
yInjector is a MySQL Injection penetration tool. SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input ...
Microsoft Security Update Guide, Second Edition The Microsoft Security Update Guide is a valuable source of in-depth information and tools that can help you protect your IT infrastructure while creating a safer, more secure computing and Internet environment. We developed this guide to help IT professionals better understand and maximize ...
The Hatkit Proxy is an intercepting http/tcp proxy based on the Owasp Proxy, but with several additions. These additions are: Swing-based UI, Interception capabilities with manual edit, Syntax highlightning (html/form-data/http) based on JFlex, Storage of http traffic into MongoDB database, Interception capabilities of tcp-traffic, Possibilities to intercept in Fully Qualified ...
iExploder is like a fire hydrant full of bad HTML and CSS code to test the stability and security of web browsers. Available as a full-featured browser harness, standalone webserver or CGI script, it continuously feeds browsers bad data in the hope that they will eventually crash. It is designed ...
The Security Onion LiveDVD is a bootable DVD that contains software used for installing, configuring, and testing Intrusion Detection Systems. It is based on Xubuntu 10.04 and contains Snort, Suricata, Sguil, Squert, Xplico, nmap, metasploit, Armitage, scapy, hping, netcat, tcpreplay, and many other security tools. What can it be ...
QuickRecon is a simple information gathering tool. Downloads ↓ QuickRecon is a simple information gathering tool that allows you to: Bruteforce subdomains of a target domain Perform zone transfer Gather email addresses from Google.com and Bing.com Find human relationships using XHTML Friends Network (microformats) Zone transfer mode in QuickRecon depends ...
Monocle is a local network host discovery tool. In passive mode, it will listen for ARP request and reply packets. In active mode, it will send ARP requests to the specific IP range. The results are a list of IP and MAC addresses present on the local network. Written to ...