Category Archives: Tools

Tails 1.2 Released

Tails

New version of Tails 1.2 a linux distribution have been release with several new features and security patches.  TAILS (The Amnesic Incognito Live System) is based on debian operating system and have been used by Edward Snowden because it help

BackBox 4.0 Released

backbox

Backbox is a Linux distribution that can be used for several security purposes like penetration testing, incident handling or intelligence gathering. New version BackBox 4.0 have been released with additional applications and update to improve functionality. New features include: Preinstalled

CAINE 6.0 – Dark Matter is out!

CAINE 6

New release for CAINE 6.0 (Computer Aided INvestigative Environment) is available and can be downloaded on the official website. CAINE is a live distribution designed for forensic analysis, finding hidden and deleted data on disks and detect information to restore the system. 

OpenSOC- Open Security Operations Center

cloud-monitoring

Security monitoring systems are important for detecting and analyzing security risks and incidents as they are happening. OpenSOC is an open source framework that integrates a variety of open source big data technologies in order to offer a centralized tool

MITMf – Framework for Man-In-The-Middle attacks

MITMF is another framework that can be used for man-in-the-middle attack. the tool is python based and have several plugins that adds more functionality during a penetration test. some of useful plugins are: jskeylogger – this plugin injects a javascript

CAPLOADER- Tool to handle large amounts of network traffic

PCAP files are important during investigation of a network based incidents, this to find out and resolve any network issue such as a malicious scan or a DoS attack against your services. CAPLOADER is a tool that will help in

Responder- MITM and Network Spoofing Tool

Responder is a tool from SpiderLabs that can be used during a pentest for spoofing and network man-in-the-middle attacks. Initially the utility comes to spoof special network protocols for resolving hostnames such as NBNS which is similar to DNS service.