Tag Archives: Pentesting

windows-privesc-check – Tool to Check Windows Privilege Escalation Vectors

windows-privesc-check -Windows operating systems include many security features to control access and privileges. It is possible to provide access based on roles and responsibilities beside providing a full access to modify the files/directories or read-only access. If you are looking

Sn1per – Automated Pentest Recon Scanner

Sn1per is an automated open source scanner that you can use during penetration testing. the tool allow to use some compilation of pentest utility such as the harvester , nmap and brute force against your target. some of the features

Watcher Web passive vulnerability scanner

Web applications are one of the most targeted systems as they are directly exposed to internet. There is no web server without serious vulnerabilities, it is enough that you open exploit DB where you will find how it is simple

jsql-injection – Java based Automatic SQL Injection Tool

Today about all programing languages support the working with databses, This makes in penetration test you will need to have several tool to pentest targeted platform. If you want to pentest Java based platform you can consider jSQL. jSQL Injection

Kali Linux Advanced Offensive Distribution

The penetration testing distribution BackTrack has changed its name to Kali and moved from Ubuntu based operating system to Debian. Kali can be used for penetration testing and security assessment different systems. It is completely similar to what BackTrack provides

BackBox 3.05 – Penetration Testing Distribution!

Over this week the Linux Foundation announced a new distribution for BackBox Linux 3.05, which contains the kernel of Linux 3.2. This distribution is similar to backtrack and comes to test the security level of a system. According to the

MysqlPasswordAuditor Tool for Recovering Mysql Passwords

Auditing password security level is important to have an idea if the system is secure or not, sometimes system administrators forget about using the secure password and leave it weak to remember it later, this is not good practice. To