Category Archives: Tools

Asgard – PHP Malware Scanner

When hackers compromise a website they usually implement a backdoor or a malicious script this to infect visitors and spread the malware or having a point of access on the vulnerable website for the future. If you are looking to

hyperfox – tool to proxify and record HTTP/HTTPs traffic

Network security assessment tools are important to verify what type of vulnerabilities exist. if you are looking to pentest any connected network you can consider Hyperfox. Hyperfox is a tool that allow user to record and proxy communication on the

PortEx- Java Library for Static Analysis of PE File

PortEX

PortEx is a Java library for static malware analysis of Portable Executable files. Its focus is on PE malformation robustness, and anomaly detection. PortEx is written in Java and Scala, and targeted at Java applications. some of the features are:

Cartero- E-Mail phishing framework

phishing tool

Cartero is a tool that you can use to create and send phishing emails with the command line interface, the framework include several modules and allow user to create their own module as well. the framework include the following features:

malwaRE- Malware repository framework

Malware exist with different behavior and many security research teams install distributed honeypots to detect new malwares. the honeypots will emulate vulnerable services that attract malwares and  they help to catch new binaries. if you are in the malware research

PuttyRider- Tool to hijack putty sessions

Putty is a very useful tool for running secure shell and remote administration on servers. If you are looking to make a pentest against putty sessions you can use PuttyRider. this is an open source tool that will inject and hook

Parrot Security OS- Cloud friendly Security Testing Operating System

Today we have many distributions that can be used for pentest including kali, backbox and Parrot. Parrot Security OS is a cloud friendly operating system designed for Pentesting, Computer Forensic, Reverse engineering, Hacking, Cloud pentesting, privacy/anonimity and cryptography. Based on