Month: January 2014

13 Results / Page 1 of 2

todayJanuary 22, 2014

close

Web Application + Tools MaxiSoler

Netsparker v3.2 Released

Netsparker can crawl, attack and identify vulnerabilities in all custom web applications regardless of the platform and the technology they are built on, just like an actual attacker. It can identify web application vulnerabilities like SQL Injection, Cross-site Scripting (XSS), Remote Code Execution and many more. It has exploitation built on it, for example you can ...

Tools MaxiSoler / January 21, 2014

GoldenEye v2.0 – DoS Tool Released

GoldenEye is a HTTP/S Layer 7 Denial-of-Service Testing Tool. It uses KeepAlive (and Connection: keep-alive) paired with Cache-Control options to persist socket connection busting through caching (when possible) until it consumes all available sockets on the HTTP/S server.

Tools NJ Ouchn / January 13, 2014

Hook Analyser v3.0 The malware analysis utility released with the support of Cyber Threat Intelligence

Hook Analyser is a freeware project, started in 2011, to analyze an application during the runtime. The project can be potentially useful in analyzing malwares (static and run time), and for performing application crash analysis. Read here the documentation that explains in detail the project >> https://docs.google.com/file/d/0B4eYJx0xZdQAakoyRXpib1VENEE Here is the ...

todayJanuary 13, 2014

close

Papers + Tools NJ Ouchn

CIS CentOS Linux 6 Benchmark v1.0.0 released

This document, CIS CentOS Linux 6 Benchmark, provides prescriptive guidance for establishing a secure configuration posture for CentOS Linux versions 6.0 – 6.5 running on x86 and x64 platforms. This guide was tested against CentOS 6.5 as installed by CentOS-6.5-x86_64-LiveDVD. [button size=medium style=round color=red align=none url=http://benchmarks.cisecurity.org/downloads/show-single/index.cfm?file=centos6.100 ]Download [/button] Document submitted ...

Tools NJ Ouchn / January 13, 2014

[New Tool] Powershell Payload Excel Delivery

A method of delivering a powershell payload via an excel macro. It contains malware characteristics, such as a self-deleting batch file and automatic persistence on the system. This is a VBA macro that uses Matt Graeber’s Invoke-Shellcode to execute a powershell payload in memory as well as schedule a task ...

todayJanuary 13, 2014

close

Tools NJ Ouchn

Subterfuge The Man-in-the-Middle Attacks Framework v1.0 released

Subterfuge, a Framework to take the arcane art of Man-in-the-Middle Attacks and make it as simple as point and shoot. Subterfuge demonstrates vulnerabilities in the ARP Protocol by harvesting credentials that go across the network and even exploiting machines by injecting malicious code directly into their browsing sessions. The first ...


LOGO

  • help@firwl.com
  • info@firwl.com


Products


Company


Contacts

Support


LOGO

  • help@firwl.com
  • info@firwl.com


Products


Company


Contacts

Support