
Top Twenty Most Exploited Vulnerabilities in 2021
The number of vulnerabilities in 2021 have dramatically increased so that the technical teams in charge of the patch management find themselves drowning in a myriad of critical and urgent task
PPEE (puppy) is a Professional PE file Explorer for reversers, malware researchers and those who want to statically inspect PE files in more details. Puppy is free and tries to be small, fast, nimble and friendly as your puppy!
TRANScurity Platform is a tool for static binary file format analysis is to complete the existing tool set by a place where experts, prospective experts and students can exchange and extend their knowledge. Especially in educational context, this requires the possibility to access detailed information and documentation about internal structures ...
WPSeku is a black box WordPress vulnerability scanner that can be used to scan remote WordPress installations to find security issues.
Infoga is a tool for gathering e-mail accounts information from different public sources (search engines, pgp key servers). Is a really simple tool, but very effective for the early stages of a penetration test or just to know the visibility of your company in the Internet.
BruteSpray takes nmap GNMAP/XML output and automatically brute-forces services with default credentials using Medusa. BruteSpray can even find non-standard ports by using the -sV inside Nmap.
inVtero.net is a high speed (Gbps) Forensics, Memory integrity & assurance tool. Includes offensive & defensive memory capabilities. Find/Extract processes, hypervisors (including nested) in memory dumps using microarchitechture independent Virtual Machine Introspection techniques.
MalwareSearch is a developed to facilitate and speed up the process of finding and downloading malware samples via the command line interface.
PTNotes is a simple tool for taking notes in a pentest. PTNotes uses data from imported Nessus and Nmap files along with the built-in attack data to build a list of hosts, open ports, and potential attack vectors. It then allows you to add notes to each host and each ...
CATPHISH analyzes target domain to generate similar-looking domains for phishing attacks.