Category Archives: Tools
There are many tools that allow to generate backdoors and they are used during a penetration testing program or security awareness where the presenter demonstrate how it is easy to have a full control on a remote vulnerable system. The
TaskExplorer is a tool that you can use to explore running processes on Mac operating system. some of the features are: Signing Status quickly view, (or filter) tasks that are signed by Apple, 3rd-parties, or are unsigned VirusTotal Integration detection
Any database may include sensitive information such as usernames , passwords or users data. This makes a proper security assessment with whole architecture review is required for identifying security gaps that can be used by hackers to compromise the system.
Studying the application and learning more about what it is really doing on the system is very important. Android applications are similar to any other application that may include suspicious and malicious software. If you are looking to investigate this
Sometime you want to investigate application and processes running on the windows operating system. this will help to find the functions performed by the app which can be legitimate , suspicious or malicious. in similar cases you can check SpyStudio.
J2EEScan is a plugin that you can add on Burp Suite security scanning tool. The goal of this plugin is to improve the test coverage during web application penetration tests on J2EE applications. The plugin is fully integrated into the