Security List Network™
Follow Us on FacebookFollow Us on Google+Follow Us on TwitterFollow Us on Pinterest
Menu
  • Home
  • About Us
  • Security Archives
  • Partners
Menu
  • Automation
  • Browser
  • Brute Force
  • Code Scripting
  • Cryptography
  • Encryption
  • Exploits
  • Framework
  • Linux Security Distros
  • Mobile Applications Tools
    • Android Tools
    • iPhone Tools
  • Networking
    • Bluetooth
    • Monitoring/System Administrator
    • Network Mapping/Scanner
    • Packet Sniffer/Sniffing
    • Internet Security
    • Spoofing/Spoofer
    • Wireless/wifi
  • Penetration Test
    • BenchMark
    • Cross Site Scripting(XSS)
    • Fuzzer/Fuzzing
    • Sql Injection
    • Stress Testing
  • Security Tools
    • Anti Malware/Virus – Malware Analysis
    • Firewall
    • Intrussion Detection and Prevention System(IDS/IPS)
    • Registry Analysis

SITEMAP

Archives

Browse: Home   /   L3G10n
NetworkAlarm - tool to monitor for possible security vulnerability.

NetworkAlarm – tool to monitor for possible security vulnerability.

April 6, 2018
L3G10n
Networking, Security Tools

NetworkAlarm is A command-line tool to monitor local network traffic for possible security vulnerabilities. Warns user against possible nmap scans, Nikto scans, credentials sent in-the-clear,…

Read Article →
remediation - Tools and utilities for remediation and incident-response handling.

remediation – Tools and utilities for remediation and incident-response handling.

March 9, 2018
L3G10n
Digital Forensics, Firewall

remediation is a Tools and utilities for remediation and incident-response handling. JewelRunner is intended to quickly analyze tcp/ip traffic for a target host and create…

Read Article →
PhishThis - Test phishing email detector.

PhishThis – Test phishing email detector.

February 20, 2018
L3G10n
Code Scripting, Phishing, Security Tools

Ever get excessively bothered by the test phishing emails that InfoSec sends to educate you and your co-workers? PhishThis is here to help. PhishThis will…

Read Article →
B2Response - Logged PS Remote Command Wrapper for simplified Blue Team Forensics/IR.

B2Response – Logged PS Remote Command Wrapper for simplified Blue Team Forensics/IR.

January 30, 2018
L3G10n
Browser, Digital Forensics

B2Response (beta) is a Powershell script for Logged PS Remote Command Wrapper for simplified Blue Team Forensics/IR Dependencies: + Powershell v3.0 or Higher Some Features:…

Read Article →
Network Monitoring Tool - a tool monitors whole subnets (IP-Address ranges) for hardware changes and vulnerability.

Network Monitoring Tool – a tool monitors whole subnets (IP-Address ranges) for hardware changes and vulnerability.

January 14, 2018
L3G10n
Monitoring/System Administrator, Scanner

Network Monitoring Tool is A simple network monitoring tool designed to notify the network administrator about changes and vulnerabilities. Requirements + nmap version 7.00 or…

Read Article →
WireSpy (wsd) - captures packets and generates firewall rules and netflow logs.

WireSpy (wsd) – captures packets and generates firewall rules and netflow logs.

January 4, 2018
L3G10n
Firewall, Monitoring/System Administrator, Networking

What is wsd? Wirespy is a simple network sniffer for information security that extracts interesting metadata about network traffic and logs it. That sounds like…

Read Article →
ketshash - tool for detecting suspicious privileged NTLM connections.

ketshash – tool for detecting suspicious privileged NTLM connections.

December 20, 2017
L3G10n
Code Scripting, Security Tools

Ketshash is A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs. Requirements Account with the following…

Read Article →
ROCA - Infineon RSA key vulnerability.

ROCA – Infineon RSA key vulnerability.

November 8, 2017
L3G10n
Encryption, Security Tools

The ROCA vulnerability has been discovered by researchers at Masaryk University (Brno, Czech Republic). As two of the researchers are also affiliated with Enigma Bridge…

Read Article →
1 2 … 10 Next →

Copyright © 2022

Powered by Worldwide CyberSecurity Team.

  • Digital Forensics
  • Networking
  • Penetration Test
  • Security Tools