Category Archives: Tools

drozer- security and attack framework for Android

Android becomes a popular platform for developers and we see an increasing number of applications running on mobile devices that support this system. Technology have rapidly changed and security tools for making the assessment are also increasing.  drozer is a

SpiderFoot Remote Footprinting and Reconnaissance Tool

Footprinting your target is one of the first steps you run during a penetration testing. This will help to identify system configuration and applications used. One of the tools that you can use is spiderfoot. spiderfoot is a python based open

DarunGrim- A Patch Analysis and Binary Diffing Tool

Security patches are always required to fix software vulnerabilities on different system. While it is always important to test the security patches for functionality of your system some more steps are required also to confirm that the package is the

MITMER- MITM Testing Tool

Securing the traffic in your network is important to prevent MITM attack that can be used to sniff sensitive information on your network. Some users may require to open sensitive portals of the office to make their work remotely without

TNS Connection Profiler – Oracle Tool

TNS listener is a service that allows clients application to connect to oracle database. The service running on the database allows to log and control the connection and by default it uses port 1521/1526. Database administrator needs to restrict this

iRET – iOS Reverse Engineering Toolkit

iRET is an open source tool that you can use to analyze and evaluate iOS applications. The toolkit includes the following features: Binary Analysis where you can check the binary encryption , architecture of the application and if it has

Volafox Mac OS X Memory Analysis Toolkit

Volafox is an open source toolkit that you can use for Mac OS X and BSD forensics. The tool is a python based and allows investigating security incidents and finding information for malwares and any malicious program on the system.