Tag Archives: open source

PortEx- Java Library for Static Analysis of PE File

PortEX

PortEx is a Java library for static malware analysis of Portable Executable files. Its focus is on PE malformation robustness, and anomaly detection. PortEx is written in Java and Scala, and targeted at Java applications. some of the features are:

Cartero- E-Mail phishing framework

phishing tool

Cartero is a tool that you can use to create and send phishing emails with the command line interface, the framework include several modules and allow user to create their own module as well. the framework include the following features:

WiFiPhisher- Fast automated phishing attacks against WiFi networks

phishing

Usual scenario for compromising a system starts with a phishing attack. this allows to run a targeted attack against the user and it is always adapted to specific user. If you need to implement a phishing attack in wifi network

PuttyRider- Tool to hijack putty sessions

Putty is a very useful tool for running secure shell and remote administration on servers. If you are looking to make a pentest against putty sessions you can use PuttyRider. this is an open source tool that will inject and hook

RPEF- Tool to generate routers firmware with backdoor

Botnet

Network devices and routers are the best target for several reasons such as  they include a firmware that can be shipped with backdoor and there is no antivirus to detect/identify malicious code on the firmware. This makes with each router

nogotofail- Blackbox network traffic security testing tool

nogotofail

Nogotofail is an automated tool that you can use for testing network security on any device. this to allow finding security vulnerabilities , to verify fixes and monitor regression and understand the application traffic generated by the network device. The

tinfoleak- Tool to provide detailed information about a Twitter user activity

twitter privacy

Today major companies and people are using social media to promote their products and have more exposure to what activities they are performing. this will help in communicating ideas and information but at the same time it may harm users