Sunday, May 27, 2018
Home Tags Security analysis

Tag: security analysis

Must Need

metasploit

Metasploit Framework

Metasploit - "The de facto of Exploit Development", "The Attackers Playbook", "The one-stop Penetration Testing Solution" and it goes on.... Metasploit is a framework of...

Yersinia

Yersinia for Layer 2 - Vulnerability Analysis & DHCP Starvation Yersinia is a network tool designed to take advantage of some weakeness in different network...
Man-in-the-middle

MITM : Man-in-the-middle Router

Turn any linux PC into an open Wi-Fi organize that quietly mitm or Man-in-the-middle all http activity. Keeps running inside a Docker container utilizing hostapd,...
siem

SIEM – A Beginner’s Guide

What is a SIEM ? SIEM when expanded becomes Security Information Event Management. As it’s name suggests,  the main function of a SIEM is Event...
whatweb

whatweb

Simple but effective Web Discovery & Web Vulnerability Analysis with whatweb Whatweb is the perfect name for this tool. Simply it answers the question, “What...
DVHMA

DVHMA – Damn Vulnerable Hybrid Mobile Application

Damn Vulnerable Hybrid Mobile App or DVHMA is a hybrid mobile app for Android that deliberately contains vulnerabilities. Its motivation is to empower security...
XVNA

XVNA – Extreme Vulnerable Node Application

XVNA is an extraordinary vulnerable node application coded in Nodejs(Expressjs)/MongoDB that causes security aficionados to learn application security. It's not advised to have this...