
Top Twenty Most Exploited Vulnerabilities in 2021
The number of vulnerabilities in 2021 have dramatically increased so that the technical teams in charge of the patch management find themselves drowning in a myriad of critical and urgent task
todayFebruary 13, 2022
Tools NJ Ouchn
The number of vulnerabilities in 2021 have dramatically increased so that the technical teams in charge of the patch management find themselves drowning in a myriad of critical and urgent task
todayFebruary 13, 2022
Tools NJ Ouchn
The number of vulnerabilities in 2021 have dramatically increased so that the technical teams in charge of the patch management find themselves drowning in a myriad of critical and urgent task
Tools + Interview + ToolsTube NJ Ouchn todayMarch 19, 2012
peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful or not. The aim of this tool is to provide all the necessary components that a security researcher could need in a PDF analysis without using 3 or 4 tools to make all the tasks. It’s included in BackTrack and REMnux.
Some of the peepdf features:
Jose Miguel Esparza is a security researcher and has been working as e-crime analyst at S21sec e-crime for more than 5 years, focused on botnets, malware and Internet fraud. Author of some exploits and analysis tools like Malybuzz and peepdf (http://eternal-todo.com/tools). He is also a regular writer in the S21sec blogs (http://blog.s21sec.com and http://securityblog.s21sec.com) and http://eternal-todo.com about security and threats in Internet, and has taken part in several conferences, e.g. RootedCon (Spain), CARO Workshop (Czech Republic) and Source Seattle (USA).
Written by: NJ Ouchn
Tagged as: ToolsTube, Blackhat Europe 2012, peepdf, Interview, Jose Miguel Esparza.
"Passion is needed for any great work, and for the revolution, passion and audacity are required in big doses"
Tools NJ Ouchn
What is Seccubus? Seccubus automates regular vulnerability scans and provides delta reporting. The goal is to reduce the analysis time for subsequent scans of the same infrastructure by only reporting ...
Copyright 2019 Cyber Security Design Concept by QantumThemes.
Post comments (0)