Security List Network™
Follow Us on FacebookFollow Us on Google+Follow Us on TwitterFollow Us on Pinterest
Menu
  • Home
  • About Us
  • Security Archives
  • Partners
Menu
  • Automation
  • Browser
  • Brute Force
  • Code Scripting
  • Cryptography
  • Encryption
  • Exploits
  • Framework
  • Linux Security Distros
  • Mobile Applications Tools
    • Android Tools
    • iPhone Tools
  • Networking
    • Bluetooth
    • Monitoring/System Administrator
    • Network Mapping/Scanner
    • Packet Sniffer/Sniffing
    • Internet Security
    • Spoofing/Spoofer
    • Wireless/wifi
  • Penetration Test
    • BenchMark
    • Cross Site Scripting(XSS)
    • Fuzzer/Fuzzing
    • Sql Injection
    • Stress Testing
  • Security Tools
    • Anti Malware/Virus – Malware Analysis
    • Firewall
    • Intrussion Detection and Prevention System(IDS/IPS)
    • Registry Analysis

SITEMAP

Archives

Browse: Home   /   Penetration Test   /   Page 38
kimi - Malicious Debian Package generator.

kimi – Malicious Debian Package generator.

February 20, 2017
K-159
Penetration Test

Kimi is a script which generates Malicious debian package for metasploit which consists of bash file. the bash file is deployed into “/usr/local/bin/” directory. Bash…

Read Article →
RogueSploit - a Powerfull social engeering Wi-Fi trap!

RogueSploit – a Powerfull social engeering Wi-Fi trap!

February 17, 2017
ahm3ds
Browser, Exploits, Penetration Test, Wireless/wifi

::DISCLAIMER:: RogueSploit is intended to be used for legal security purposes only, and you should only use it to protect networks/hosts you own or have…

Read Article →
OSRFramework - an Open Sources Intelligence Gathering Research Framework.

OSRFramework – an Open Sources Intelligence Gathering Research Framework.

February 16, 2017
0x0ptimus
Framework, Networking, Penetration Test

Changelog osrframework v0.15.0rc13: + Fix issue: Overwrite previous browser.cfg and general.cfg files Errors were being thrown if the application was being upgraded from 0.14.x versions….

Read Article →
OverThruster - HID attack payload generator.

OverThruster – HID attack payload generator.

February 15, 2017
eldad
Penetration Test

Disclaimer: Don’t do anything illegal with this. Usage of OverThruster for attacking targets without prior mutual consent is illegal. It is the end user’s responsibility…

Read Article →
Wily Possum - A firewall penetration testing tool suite.

Wily Possum – A firewall penetration testing tool suite.

February 15, 2017
Infosec
Firewall, Penetration Test

Wily Possum – is a python and bash script for firewall penetration testing tool suite. Most of these tools and tests was a client/server model…

Read Article →
mongoaudit - a powerful MongoDB auditing and penetration test tool.

mongoaudit – a powerful MongoDB auditing and penetration test tool.

February 14, 2017
cydec
Encryption, Penetration Test

mongoaudit is a CLI tool for auditing MongoDB servers, detecting poor security settings and performing automated penetration testing. Introduction: * It is widely known that…

Read Article →
LHF - a reconnaissance tool for penetration test.

LHF – a reconnaissance tool for penetration test.

February 13, 2017
K-159
Penetration Test

LHF: Low Hanging Fruit a recon tool for penetration testing This tool is meant to be “modular” i.e. you can add a new tool in…

Read Article →
Universal Radio Hacker is a suite for investigating unknown wireless protocols.

Universal Radio Hacker is a suite for investigating unknown wireless protocols.

February 11, 2017
Fragile
Penetration Test, Wireless/wifi

Universal Radio Hacker is a suite for investigating unknown wireless protocols. Features include: + hardware interfaces for common Software Defined Radios + easy demodulation of…

Read Article →
← Previous 1 … 37 38 39 … 216 Next →

Copyright © 2019

Powered by Worldwide CyberSecurity Team.

  • Digital Forensics
  • Networking
  • Penetration Test
  • Security Tools