Category Archives: Open-Source

Lynis v2.0.0- Security auditing and hardening tool

New release for Lynis an auditing tool for Unix. It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims

Netcrypt- .NET executable packer

Netcrypt A proof-of-concept packer for .NET executables, designed to provide a starting point to explain the basic principles of runtime packing. It is a full implementation of a simple .NET PE file packer, which doesn’t use native code, and with

honggfuzz – general-purpose fuzzer

honggfuzz is a general-purpose, easy-to-use fuzzer that supplies and modifies input to a test program and utilize the ptrace() API/POSIX signal interface to detect and log crashes. some of the features: Easy setup: No complicated configuration files or setup necessary

CiscoRouter- Tool for scanning Cisco router products over SSH

cisco router

Cisco routers may have security vulnerabilities or misconfiguration that allow attacker to change or control the device remotely. if you are looking to scan cisco router device you can check CiscoRouter. CiscoRouter is a tool for scanning Cisco-based routers over

OSXCollector- Forensic collection & analysis toolkit

OSXcollector

OSXCollector is an information gathering and analysis toolkit that you can use for running a forensics against OSX based operating systems. the toolkit include a number of python scripts that create JSON file with information about the targeted system if

Droopescan- plugin-based scanner for Drupal & Silverstripe

Web application scanning is very important to identify vulnerabilities and security gaps that allow a hacker to compromise the web servers. Today we have several open source tools that help to make a verification on content management system like Droopescan.

Asgard – PHP Malware Scanner

When hackers compromise a website they usually implement a backdoor or a malicious script this to infect visitors and spread the malware or having a point of access on the vulnerable website for the future. If you are looking to