Tag Archives: penetration testing

Parrot Security OS- Cloud friendly Security Testing Operating System

Today we have many distributions that can be used for pentest including kali, backbox and Parrot. Parrot Security OS is a cloud friendly operating system designed for Pentesting, Computer Forensic, Reverse engineering, Hacking, Cloud pentesting, privacy/anonimity and cryptography. Based on

Heybe – Penetration Testing Automation Toolkit

Heybe

Heybe is Penetration Testing Automation Kit. It consists of modules that can be used to fully automate pen-tests and make them mode effective. With Heybe you can 0wn all systems in a target company in matter of minutes. Heybe modules:

BackBox 4.0 Released

backbox

Backbox is a Linux distribution that can be used for several security purposes like penetration testing, incident handling or intelligence gathering. New version BackBox 4.0 have been released with additional applications and update to improve functionality. New features include: Preinstalled

Viproy – VoIP Penetration Testing Kit

viproy

VoIP security testing is important to verify the quality of your system before it is moved into production. One of the tool that you can consider for pentest VoIP is Viproy.  This tool have been presented on DefCON and include

New release Kali Linux 1.0.8

New release have been announced for Kali Linux a distribution that include more then 300 penetration testing tools. the new version is  Kali Linux 1.0.8 and allow user to have the full system embedded in a USB device. This will

iRET – iOS Reverse Engineering Toolkit

iRET is an open source tool that you can use to analyze and evaluate iOS applications. The toolkit includes the following features: Binary Analysis where you can check the binary encryption , architecture of the application and if it has

DSploit Android Toolkit for Security Testing

dSploit is a very comfortable tool that you can install on Android to run a pentest or network security assessment. The toolkit allows fingerprinting the remote operating systems and identifying different hosts, scans the network for system vulnerabilities and performing