Category Archives: Open-Source

CANard – Vehicle Hacking Platform

CAN car hacking

Hacking cars have been demonstrated several times this year. New technologies that were implemented served in improving Cars connectivity and usability, but on the other hand have opened some security gaps that car manufactures should fix. Today cars include CAN

RDPY- tool to perform MITM attack on RDP Sessions

Remote Desktop Protocol is used on almost any network, This allow user to manage windows servers remotely and to have server desktop full control. Some user feel more comfortable with it to schedule tasks or install applications. Others prefer to

YSO Mobile Security Framework- Mobile application pen-testing framework

YSO Mobile Security Framework is an intelligent, all-in-one open source mobile application (Android/iOS) automated pen-testing framework capable of performing static and dynamic analysis. YSO Mobile Security Framework can be used for effective and fast security analysis of Android APK/Android app

Lynis v2.0.0- Security auditing and hardening tool

New release for Lynis an auditing tool for Unix. It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims

Netcrypt- .NET executable packer

Netcrypt A proof-of-concept packer for .NET executables, designed to provide a starting point to explain the basic principles of runtime packing. It is a full implementation of a simple .NET PE file packer, which doesn’t use native code, and with

honggfuzz – general-purpose fuzzer

honggfuzz is a general-purpose, easy-to-use fuzzer that supplies and modifies input to a test program and utilize the ptrace() API/POSIX signal interface to detect and log crashes. some of the features: Easy setup: No complicated configuration files or setup necessary

CiscoRouter- Tool for scanning Cisco router products over SSH

cisco router

Cisco routers may have security vulnerabilities or misconfiguration that allow attacker to change or control the device remotely. if you are looking to scan cisco router device you can check CiscoRouter. CiscoRouter is a tool for scanning Cisco-based routers over