Tag Archives: Tools

Parrot Security OS- Cloud friendly Security Testing Operating System

Today we have many distributions that can be used for pentest including kali, backbox and Parrot. Parrot Security OS is a cloud friendly operating system designed for Pentesting, Computer Forensic, Reverse engineering, Hacking, Cloud pentesting, privacy/anonimity and cryptography. Based on

nogotofail- Blackbox network traffic security testing tool

nogotofail

Nogotofail is an automated tool that you can use for testing network security on any device. this to allow finding security vulnerabilities , to verify fixes and monitor regression and understand the application traffic generated by the network device. The

Heybe – Penetration Testing Automation Toolkit

Heybe

Heybe is Penetration Testing Automation Kit. It consists of modules that can be used to fully automate pen-tests and make them mode effective. With Heybe you can 0wn all systems in a target company in matter of minutes. Heybe modules:

BackBox 4.0 Released

backbox

Backbox is a Linux distribution that can be used for several security purposes like penetration testing, incident handling or intelligence gathering. New version BackBox 4.0 have been released with additional applications and update to improve functionality. New features include: Preinstalled

CAINE 6.0 – Dark Matter is out!

CAINE 6

New release for CAINE 6.0 (Computer Aided INvestigative Environment) is available and can be downloaded on the official website. CAINE is a live distribution designed for forensic analysis, finding hidden and deleted data on disks and detect information to restore the system. 

OpenSOC- Open Security Operations Center

cloud-monitoring

Security monitoring systems are important for detecting and analyzing security risks and incidents as they are happening. OpenSOC is an open source framework that integrates a variety of open source big data technologies in order to offer a centralized tool

MITMf – Framework for Man-In-The-Middle attacks

MITMF is another framework that can be used for man-in-the-middle attack. the tool is python based and have several plugins that adds more functionality during a penetration test. some of useful plugins are: jskeylogger – this plugin injects a javascript