pentesting
22 Open-source Free Android Security and Pentesting Tools for Dynamic and Static APK Analysis - APK Testing: The Frontline of Android Security
APK Testing: The Frontline of Android Security
pentesting
APK Testing: The Frontline of Android Security
pentesting
Unveiling the Power of Code Analysis in Penetration Testing Cracking the Code: Static vs. Dynamic Analysis for Aspiring Security Pros
Self-hosted
MediaMTX is a free, open-source media server supporting real-time video streaming, RTSP, RTMP, HLS, and WebRTC. It enables the management and streaming of video from various sources, including RTSP cameras, with low-latency performance. It is a lightweight solution that is written using Go language. Features * Publish live streams to the
Python
Web traffic obfuscation is a privacy-enhancing technique that involves generating random internet traffic to mask a user's actual browsing patterns. This approach is based on the principle of introducing "noise" into one's digital footprint, making it more challenging for third parties to accurately profile
Python
Enhance Privacy: Generate Random HTTP/DNS Traffic Noise with Python
CCTV
Viseron is an open-source self-hosted CCTV and local-first NVR solution with AI-powered computer vision support. It comes with amazing powerful features as Object detection, motion detection, face recognition, image classification, and supports hardware acceleration. Key features * Object Detection: YOLOv3/v4/v7 (OpenCV), Tensorflow (Google Coral EdgeTPU), CodeProject.AI * Motion Detection
privacy
Imagine you're at a fancy restaurant. You don't talk directly to the chefs in the kitchen, right? Instead, there's a waiter who takes your order, delivers it to the kitchen, and brings back your food. That waiter is like a reverse proxy in the
Cybersecurity
Vuls is an open-source, agentless vulnerability scanner designed to help administrators and security professionals, like pentesters, keep their systems secure. It’s written in Go, known for its lightweight and high-performance capabilities. Vuls provides a proactive way to detect vulnerabilities without needing to install any agents on the target systems,
WordPress
WordPress is a versatile and widely-used content management system (CMS) that powers over 75 million websites worldwide, making it a popular choice for businesses, bloggers, and e-commerce platforms alike. Its user-friendly interface and extensive customization options through themes and plugins have contributed to its immense popularity. However, with great power
web spider
Wapiti is a free and open-source web application vulnerability scanner that enables users to assess the security of their applications, including WordPress sites. It performs security audits by analyzing web applications for vulnerabilities, such as SQL injection, Cross-Site Scripting (XSS), and file disclosure issues. Wapiti works as a "black-box&
dns
DNSCrypt is a protocol that encrypts, authenticates and optionally anonymizes communications between a DNS client and a DNS resolver. It prevents DNS spoofing. It uses cryptographic signatures to verify that responses originate from the chosen DNS resolver and haven’t been tampered with. It is an open specification, with free
Cybersecurity
Nginx is a popular open-source server that runs most of the websites, web apps and services on the internet nowadays. However, bad configuration can leave your website vulnerable to hackers. Some may use some Nginx dashboards and UI tools for better and easier system configuration, you may read about them
Android
Block malware, spyware, ads, and trackers across all apps with Rethink DNS. Servers in 300+ locations: Experience Blazing fast speeds.
Cybersecurity
What is MQTT (Message Queuing Telemetry Transport)? MQTT (Message Queuing Telemetry Transport) is an OASIS standard messaging protocol specifically designed for the Internet of Things (IoT). Its lightweight architecture is perfect for connecting remote devices that have limited resources and minimal network bandwidth. This makes MQTT an ideal choice across
pentesting
PRET is a security testing tool for printers, developed at Ruhr University Bochum. It connects to printers via network or USB and exploits PostScript, PJL, and PCL languages to manipulate print jobs, access the printer’s file system, and potentially cause physical damage. By translating UNIX-like commands into printer language,
Open Source Intelligence (OSINT)
SpiderFoot is an open source intelligence (OSINT) automation tool. It integrates with just about every data source available and utilises a range of methods for data analysis, making that data easy to navigate. SpiderFoot has an embedded web-server for providing a clean and intuitive web-based interface but can also be
Cybersecurity
In the ever-evolving landscape of cybersecurity, professionals face an increasing number of threats that require robust solutions. Offensive Security practices play a crucial role in identifying and mitigating vulnerabilities before they can be exploited. Docker, a powerful containerization platform, has emerged as a favorite among cybersecurity experts for its ability
macos
A firewall app monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between trusted and untrusted networks, blocking unauthorized access while allowing legitimate communication, thereby enhancing the overall security of devices and networks. Do you need a firewall on macOS? what
Docker
Is Your Docker Deployment Secure? Docker containers have revolutionized the way applications are deployed and managed, but with great flexibility comes the need for heightened security vigilance. Regularly checking your Docker containers is crucial to ensure they are configured correctly and free from vulnerabilities. Misconfiguration can expose your applications to
Cybersecurity
HuntKit is a collection of [penetration testing, bug bounty hunting, capture the flag, red teaming] tools in a single Docker image. Simply run the image and start using the tools. Its modular architecture allows users to customize their workflows and leverage a range of hunting techniques, enhancing the efficiency of
Android
With over 11 million Android devices affected by malware, protecting your device is more important than ever. Android’s open nature makes it a popular target for cybercriminals who exploit vulnerabilities to access your data, steal personal information, or install malicious software. A reliable malware scanner can help detect and
CCTV
While there are many commercial and open-source CCTV systems available for home and business security, many people are unaware that these systems also require security testing. This is crucial to ensure that no unauthorized users have logged in or are accessing unsecured CCTV camera feeds. Best 20 Free Open-source CCTV,
Linux
System monitors are essential tools for tracking system performance and resource usage in real time. They provide insights into CPU, memory, disk, and network activity, helping users manage both personal and server environments effectively. This is crucial for optimizing performance, troubleshooting issues, and ensuring the smooth operation of applications. Many
CCTV
This open-source project allows you to run a complete multi-CCTV system on your Linux, Raspberry Pi, Windows or macOS systems without any fee. Designed in Java, it runs on any Java-enabled system, ensuring broad compatibility. It supports multiple admins, many cameras, recording as it comes with a built-in NVR and