Saturday, October 19, 2019

Trending Tools

Prevent Hacking

How To Prevent Hacking in 2020

Hacking is a term that refers to an unauthorized intrusion into a computer network or system. Hackers may alter a computer system...
Eaphammer : Targeted Evil Twin Attacks Against Wpa2-Enterprise Networks

Eaphammer : Targeted Evil Twin Attacks Against Wpa2-Enterprise Networks

EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. It is designed to be used in full scope...
Postenum : Tool For Basic/Advanced Privilege Escalation Techniques

Postenum : Tool For Basic/Advanced Privilege Escalation Techniques

Postenum is a clean, nice and easy tool for basic/advanced privilege escalation vectors/techniques. The tool is intended to be executed locally on...
Tylium : Primary Data Pipelines For Intrusion Detection, Security Analytics & Threat Hunting

Tylium : Primary Data Pipelines For Intrusion Detection, Security Analytics & Threat Hunting

Tylium is a primary data pipelines for intrusion detection, security analytics and threat hunting. These files contain configuration for producing EDR...
FSMon : Monitor Filesystem On iOS / OS X / Android / FirefoxOS / Linux

FSMon : Monitor Filesystem On iOS / OS X / Android / FirefoxOS /...

FSMon or FileSystem Monitor utility that runs on Linux, Android, iOS and OSX. Brought to you by Sergi Àlvarez at Nowsecure and...
Traxss : Automated XSS Vulnerability Scanner

Traxss : Automated XSS Vulnerability Scanner

Traxss is an automated framework to scan URLs and webpages for XSS Vulnerabilities. It includes over 575 Payloads to test with and...
DECAF : Dynamic Executable Code Analysis Framework

DECAF : Dynamic Executable Code Analysis Framework

DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of...
Mosca : Manual Search Tool To Find Bugs Like A Grep Unix Command

Mosca : Manual Search Tool To Find Bugs Like A Grep Unix Command

Mosca is a manual analysis tool to find bugs like a grep unix command and since it is not dynamic the uses...
MalConfScan : Volatility Plugin For Extracts Configuration Data Of Known Malware

MalConfScan : Volatility Plugin For Extracts Configuration Data Of Known Malware

MalConfScan is a Volatility plugin extracts configuration data of known malware. Volatility is an open-source memory forensics framework for incident response and malware analysis. This...
SIEM

SIEM – A Beginner’s Guide to Security Information and Event Management Tools

What is a SIEM? SIEM, when expanded, becomes Security Information Event Management. As its name suggests,  the main...
5,000FollowersFollow

Most Used

Important tools