Category Archives: Pentesting

Sn1per – Automated Pentest Recon Scanner

Sn1per is an automated open source scanner that you can use during penetration testing. the tool allow to use some compilation of pentest utility such as the harvester , nmap and brute force against your target. some of the features

Zarp Network Attack tool

Corporate local area networks may have several vulnerabilities that allow attackers disrupt services or exploit the detected vulnerabilities. One of the tool that you can use to pentest local networks is Zarp Network Attack tool.  Zarp allows to perform network

WiFiPhisher- Fast automated phishing attacks against WiFi networks


Usual scenario for compromising a system starts with a phishing attack. this allows to run a targeted attack against the user and it is always adapted to specific user. If you need to implement a phishing attack in wifi network

PuttyRider- Tool to hijack putty sessions

Putty is a very useful tool for running secure shell and remote administration on servers. If you are looking to make a pentest against putty sessions you can use PuttyRider. this is an open source tool that will inject and hook

Parrot Security OS- Cloud friendly Security Testing Operating System

Today we have many distributions that can be used for pentest including kali, backbox and Parrot. Parrot Security OS is a cloud friendly operating system designed for Pentesting, Computer Forensic, Reverse engineering, Hacking, Cloud pentesting, privacy/anonimity and cryptography. Based on

BackBox 4.0 Released


Backbox is a Linux distribution that can be used for several security purposes like penetration testing, incident handling or intelligence gathering. New version BackBox 4.0 have been released with additional applications and update to improve functionality. New features include: Preinstalled

DSploit Android Toolkit for Security Testing

dSploit is a very comfortable tool that you can install on Android to run a pentest or network security assessment. The toolkit allows fingerprinting the remote operating systems and identifying different hosts, scans the network for system vulnerabilities and performing