Category Archives: Pentesting

PuttyRider- Tool to hijack putty sessions

Putty is a very useful tool for running secure shell and remote administration on servers. If you are looking to make a pentest against putty sessions you can use PuttyRider. this is an open source tool that will inject and hook

Parrot Security OS- Cloud friendly Security Testing Operating System

Today we have many distributions that can be used for pentest including kali, backbox and Parrot. Parrot Security OS is a cloud friendly operating system designed for Pentesting, Computer Forensic, Reverse engineering, Hacking, Cloud pentesting, privacy/anonimity and cryptography. Based on

BackBox 4.0 Released

backbox

Backbox is a Linux distribution that can be used for several security purposes like penetration testing, incident handling or intelligence gathering. New version BackBox 4.0 have been released with additional applications and update to improve functionality. New features include: Preinstalled

DSploit Android Toolkit for Security Testing

dSploit is a very comfortable tool that you can install on Android to run a pentest or network security assessment. The toolkit allows fingerprinting the remote operating systems and identifying different hosts, scans the network for system vulnerabilities and performing

Watcher Web passive vulnerability scanner

Web applications are one of the most targeted systems as they are directly exposed to internet. There is no web server without serious vulnerabilities, it is enough that you open exploit DB where you will find how it is simple

Kali Linux Advanced Offensive Distribution

The penetration testing distribution BackTrack has changed its name to Kali and moved from Ubuntu based operating system to Debian. Kali can be used for penetration testing and security assessment different systems. It is completely similar to what BackTrack provides

Weevely 1.1 – PHP Webshell

Weevely – is a PHP webshell that provides SSH connection to manage website remotely. it can be used as a backdoor system to PoC during a pentest or a web shell to manage legit web accounts. The shell consists of