
Top Twenty Most Exploited Vulnerabilities in 2021
The number of vulnerabilities in 2021 have dramatically increased so that the technical teams in charge of the patch management find themselves drowning in a myriad of critical and urgent task
CapTipper is a python tool to analyze, explore and revive HTTP malicious traffic. CapTipper sets up a web server that acts exactly as the server in the PCAP file, and contains internal tools, with a powerful interactive console, for analysis and inspection of the hosts, objects and conversations found. The ...
Forpix is a forensic program for identifying similar images that are no longer identical due to image manipulation.
PEStudio is a unique tool that performs the static investigation of 32-bit and 64-bit executable. PEStudio is free for private non-commercial use only.
Dear ToolsWatchers, We are honored to announce the 2014 Top Security Tools as Voted by ToolsWatch.org Readers, this is the second edition of our online voting by users and readers. Thanks for your time and your votes, are very useful for the community. 🙂 Results by Year [tabgroup][tab title=”Results 2014″] 01 – Unhide (NEW) ...
WPScan is a black box WordPress vulnerability scanner.
It is with great joy that I announce that ToolsWatch is invited to return and work in conjunction with Black Hat for the outstanding special event Black Hat Arsenal . This is our first session in the Great Asia continent (Singapore (here are things you can do as well in ...
Wireshark is the world’s foremost network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network. It is the de facto (and often de jure) standard across many industries and educational institutions.
SPARTA is a python GUI application which simplifies network infrastructure penetration testing by aiding the penetration tester in the scanning and enumeration phase.
SeeS is a Social Engineering Attack/Audit Tool for Spear Phishing. Most of the companies nowadays have their firewalls, threat monitoring and prevention security appliances setup. With these mechanisms in place, security precautions are taken and incidents are monitored. Inbound traffic being restricted, SEES on the other hand is developed for ...