Tag Archives: Tools

wifresti – tool for wireless network password recovery

wifresti - wireless network password recovery Forgetting passwords is not always a problem, there are many tools online that you can use to recover passwords for different services.

windows-privesc-check – Tool to Check Windows Privilege Escalation Vectors

windows-privesc-check -Windows operating systems include many security features to control access and privileges. It is possible to provide access based on roles and responsibilities beside providing a full access to modify the files/directories or read-only access. If you are looking

CrackMapExec – Tool for pentesting Windows/Active Directory

Corporate network is becoming more and more relying on active directory where system administrator define roles and groups for users. This is important for accountability and auditing beside admin will have a better and simpler system administration. If you are

Mimikatz – Multi-tool to play with Windows security


Mimikatz tool have been presented in international conferences such as blackhat and DefCon. This tool is designed to work with credentials on windows operating system. Mimikatz allows to extract passwords in plaintext, hash, PIN code or Kerberos tickets from the

GCAT – Fully featured backdoor that uses Gmail as a C&C server

There are many tools that allow to generate backdoors and they are used during a penetration testing program or security awareness where the presenter demonstrate how it is easy to have a full control on a remote vulnerable system. The

NoSQL EXPLOITATION FRAMEWORK – Framework For NoSQL Scanning and Exploitation

Any database may include sensitive information such as usernames , passwords or users data. This makes a proper security assessment with whole architecture review is required for identifying security gaps that can be used by hackers to compromise the system.

Smalisca – Static Code Analysis for Smali files

Studying the application and learning more about what it is really doing on the system is very important. Android applications are similar to any other application that may include suspicious and malicious software. If you are looking to investigate this