Tag Archives: opensource

OSXCollector- Forensic collection & analysis toolkit


OSXCollector is an information gathering and analysis toolkit that you can use for running a forensics against OSX based operating systems. the toolkit include a number of python scripts that create JSON file with information about the targeted system if

SNMP-Brute – Fast SNMP brute force, enumeration and password cracking tool


SNMP may include sensitive information that will provide security tester network/system info. if you are looking to pentest snmp you can use SNMP-Brute. This tool provide the following features: Brute forces both version 1 and version 2c SNMP community strings

hyperfox – tool to proxify and record HTTP/HTTPs traffic

Network security assessment tools are important to verify what type of vulnerabilities exist. if you are looking to pentest any connected network you can consider Hyperfox. Hyperfox is a tool that allow user to record and proxy communication on the

drozer- security and attack framework for Android

Android becomes a popular platform for developers and we see an increasing number of applications running on mobile devices that support this system. Technology have rapidly changed and security tools for making the assessment are also increasing.  drozer is a

Cuckoo Sandbox- Automated Malware Analysis Framework


Cuckoo Sandbox is an open source tool that can be used to reverse malwares , exploits, documents and links. the program is written in Python and running in a virtual environment VirtualBox. the application starts by creating a clean snapshot

Nagios: Total Network Visibility

Constant monitoring of your entire network components can help in detecting different problems at an early stage especially that today all machines are critical and can’t afford even minimal downtime. Redundancy will give you time to recover a failure before

Qubes OS: Security Over Virtualization

Qubes OS is a new operating system aims provide more safety measures to users; the idea behind this operating system is to protect users against new malware as it builds a Security Isolation technique based on the virtualization. To understand