Tag Archives: Tool

Droopescan- plugin-based scanner for Drupal & Silverstripe

Web application scanning is very important to identify vulnerabilities and security gaps that allow a hacker to compromise the web servers. Today we have several open source tools that help to make a verification on content management system like Droopescan.

SNMP-Brute – Fast SNMP brute force, enumeration and password cracking tool

snmp

SNMP may include sensitive information that will provide security tester network/system info. if you are looking to pentest snmp you can use SNMP-Brute. This tool provide the following features: Brute forces both version 1 and version 2c SNMP community strings

Asgard – PHP Malware Scanner

When hackers compromise a website they usually implement a backdoor or a malicious script this to infect visitors and spread the malware or having a point of access on the vulnerable website for the future. If you are looking to

hyperfox – tool to proxify and record HTTP/HTTPs traffic

Network security assessment tools are important to verify what type of vulnerabilities exist. if you are looking to pentest any connected network you can consider Hyperfox. Hyperfox is a tool that allow user to record and proxy communication on the

Cartero- E-Mail phishing framework

phishing tool

Cartero is a tool that you can use to create and send phishing emails with the command line interface, the framework include several modules and allow user to create their own module as well. the framework include the following features:

PuttyRider- Tool to hijack putty sessions

Putty is a very useful tool for running secure shell and remote administration on servers. If you are looking to make a pentest against putty sessions you can use PuttyRider. this is an open source tool that will inject and hook

Parrot Security OS- Cloud friendly Security Testing Operating System

Today we have many distributions that can be used for pentest including kali, backbox and Parrot. Parrot Security OS is a cloud friendly operating system designed for Pentesting, Computer Forensic, Reverse engineering, Hacking, Cloud pentesting, privacy/anonimity and cryptography. Based on