
Top Twenty Most Exploited Vulnerabilities in 2021
The number of vulnerabilities in 2021 have dramatically increased so that the technical teams in charge of the patch management find themselves drowning in a myriad of critical and urgent task
Tools in The Hook is intended to be a dedicated magazine for Pentesting Tools or at least what i’m really hoping. Needless to say, this is the first issue (a pilot) and there is no strategy defined yet (monthly or quarterly). Besides, I just figure out how time consuming this ...
An international team of forensics experts, led by SANS Faculty Fellow Rob Lee, created the SANS Investigative Forensic Toolkit (SIFT) Workstation and made it available to the whole community as a public service. The free SIFT toolkit, that can match any modern forensic tool suite, is also featured in SANS’ ...
Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application’s attack surface, through to finding and exploiting security vulnerabilities. Burp gives you full control, letting you combine ...
CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a project of Digital Forensics Currently the project manager is Nanni Bassetti. CAINE offers a complete forensic environment that is organized to integrate existing software tools as software modules and to provide a friendly graphical interface. The ...
Evader is designed to test your organization’s network security devices against Advanced Evasion Techniques that are increasingly used in sophisticated and targeted cyber attacks: Free download Launch controlled AET-borne attacks at your own defense technology Tweak evasions and combinations, and instantly see if you are successful Evader is not a ...
ExploitShield protects users where traditional security measures fail. It consists of an innovative patent-pending application shielding technology that prevents malicious exploits from compromising computers through software vulnerabilities. Detection testing The type of malicious behavior we are interested in testing is basically malicious drive-by download infections from exploit kits (Blackhole Exploit ...
sinfp3.pl is more than a passive and active OS fingerprinting tool. Some examples below showing how to make sinfp3 dancing # Single port active fingerprinting sinfp3.pl -target example.com -port 80 -input-ipport -verbose 1 # Single port IPv6 active fingerprinting sinfp3.pl -target example.com -port 80 -input-ipport -verbose 1 -6 # SynScan ...
Cuckoo Sandbox is an Open Source software for automating analysis of suspicious files. To do so it makes use of custom components that monitor the behavior of the malicious processes while running in an isolated environment. Cuckoo generates a handful of different raw data which include: Native functions and Windows ...
ERPScan’s SAP Pentesting Tool is a freeware tool that is intended for penetration testers and security officers for vulnerability assessment of SAP systems using Black Box testing methodologies. It means that you do not need to know any information about the target system or have a legal account in it. All the information will be collected by SAP Pentesting tool. Changelog ...