Tag Archives: open source

Lynis v2.0.0- Security auditing and hardening tool

New release for Lynis an auditing tool for Unix. It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims

Netcrypt- .NET executable packer

Netcrypt A proof-of-concept packer for .NET executables, designed to provide a starting point to explain the basic principles of runtime packing. It is a full implementation of a simple .NET PE file packer, which doesn’t use native code, and with

honggfuzz – general-purpose fuzzer

honggfuzz is a general-purpose, easy-to-use fuzzer that supplies and modifies input to a test program and utilize the ptrace() API/POSIX signal interface to detect and log crashes. some of the features: Easy setup: No complicated configuration files or setup necessary

CiscoRouter- Tool for scanning Cisco router products over SSH

cisco router

Cisco routers may have security vulnerabilities or misconfiguration that allow attacker to change or control the device remotely. if you are looking to scan cisco router device you can check CiscoRouter. CiscoRouter is a tool for scanning Cisco-based routers over

PortEx- Java Library for Static Analysis of PE File


PortEx is a Java library for static malware analysis of Portable Executable files. Its focus is on PE malformation robustness, and anomaly detection. PortEx is written in Java and Scala, and targeted at Java applications. some of the features are:

Cartero- E-Mail phishing framework

phishing tool

Cartero is a tool that you can use to create and send phishing emails with the command line interface, the framework include several modules and allow user to create their own module as well. the framework include the following features:

WiFiPhisher- Fast automated phishing attacks against WiFi networks


Usual scenario for compromising a system starts with a phishing attack. this allows to run a targeted attack against the user and it is always adapted to specific user. If you need to implement a phishing attack in wifi network