Month: September 2012

27 Results / Page 1 of 3

todaySeptember 28, 2012

close

Tools NJ Ouchn

AppSec Labs iNalyzer – iOS penetration testing framework

AppSec Labs iNalyzer is a framework for manipulating iOS applications, tampering with parameters and methods; no sources needed! AppSec Labs iNalyzer targets closed applications, turning a painful Black Box into an automatic Gray-Box effort. AppSec Labs iNalyzer Automates your testing effort as it exposes the internal logic of your target iOS application and ...

todaySeptember 27, 2012

close

Tools NJ Ouchn

Onapsis SAP Bizploit v1.50-rc1 released

Bizploit is the first Opensource ERP Penetration Testing framework. Developed by the Onapsis Research Labs, Bizploit assists security professionals in the discovery, exploration, vulnerability assessment and exploitation phases of specialized ERP Penetration Tests. Currently, Bizploit is shipped with many plugins to assess the security of SAP business platforms. Plugins for ...

todaySeptember 19, 2012

close

Tools NJ Ouchn

BlackHole Exploit Kit 2.0 released & updated with new exploits

The Blackhole exploit kit is currently the most popular web threat, where 28% of all web threats detected by Sophos and 91% by AVG are due to this exploit kit.[1] Its purpose is to deliver a malicious payload to a victim’s computer.[2] Basic summary of how Blackhole works The customer ...

todaySeptember 17, 2012

close

Tools + Web Application NJ Ouchn

Nikto v2.1.5 released

Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6500 potentially dangerous files/CGIs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as ...

todaySeptember 14, 2012

close

Tools MaxiSoler

Skipfish v2.09b Released

Skipfish is an active web application security reconnaissance tool. It prepares an interactive sitemap for the targeted site by carrying out a recursive crawl and dictionary-based probes. The resulting map is then annotated with the output from a number of active (but hopefully non-disruptive) security checks. The final report generated by the tool ...


LOGO

  • help@firwl.com
  • info@firwl.com


Products


Company


Contacts

Support


LOGO

  • help@firwl.com
  • info@firwl.com


Products


Company


Contacts

Support