Android
Yaralyze - Free malware detection Tool for Android Devices
Yaralyze is an malware detection tool for Android that relies on two types of static analysis, Yara rule analysis and hashes analysis.
Android
Yaralyze is an malware detection tool for Android that relies on two types of static analysis, Yara rule analysis and hashes analysis.
Android
In today's digital landscape, securing your Android device is more important than ever. With reports revealing that 11 million devices have been infected with malicious bots , ensuring the safety of your smartphone is a priority. If you're concerned about the security of your Android device, look
Arch Linux
Bluepot is free and open-source Bluetooth honeypot framework designed for security research and penetration testing. It creates multiple virtual Bluetooth devices, simulating vulnerable endpoints to attract attackers. Pentesters and security researchers can use Bluepot to study and analyze Bluetooth-based attacks in a controlled environment, making it a valuable tool for
pentesting
Wifiphisher is an advanced Wi-Fi security tool that automates phishing attacks against Wi-Fi networks to obtain credentials or infect devices with malware. It works by performing man-in-the-middle attacks by creating rogue access points, allowing attackers to capture credentials or deploy malware without needing brute-force methods. Wifiphisher is highly customizable and
Cybersecurity
Pixiewps is an open-source tool written in C designed to perform offline brute-force attacks on WPS (Wi-Fi Protected Setup) PINs by exploiting vulnerabilities in some software implementations. It specifically leverages the "pixie-dust attack," a method discovered by Dominique Bongard in 2014. This attack takes advantage of weak or
Cybersecurity
wifipumpkin3 is powerful framework for rogue access point attack, written in Python, that allow and offer to security researchers, red teamers and reverse engineers to mount a wireless network to conduct a man-in-the-middle attack. Features * Rogue access point attack * Man-in-the-middle attack * Module for deauthentication attack * Module for extra-captiveflask templates * Rogue
Cybersecurity
We've all been there—sipping on that overpriced coffee in a café, casually scrolling through emails, maybe even doing some online shopping (because why not?). All thanks to the glorious, "free" WiFi. But here's the catch: that free WiFi comes at a cost—your
Cybersecurity
How to Check If Your Android Phone Has Been Compromised: A Step-by-Step Guide
Healthcare
Cyber attacks are a growing concern for all industries, but healthcare is particularly vulnerable. Medical institutions hold vast amounts of sensitive data, making them prime targets for cyber criminals. Data breaches in this sector aren't just about stolen credit card numbers or leaked social security details—they can
Cybersecurity
Zenmap is the official Nmap Security Scanner GUI. It is a multi-platform (Linux, Windows, macOS, BSD, etc.) free and open source application which aims to make Nmap easy for beginners to use while providing advanced features for experienced Nmap users. Comes with Built-in history manager Frequently used scans can be
pentesting
The Zed Attack Proxy (ZAP) is one of the world's most popular open-source web app vulnerability scanner and security tools, actively maintained by a dedicated international team of volunteers. It assists developers and pentesters in automatically identifying security vulnerabilities in web applications during the development and testing phases.
Cybersecurity
Artificial intelligence (AI) is revolutionizing industries across the board, and cybersecurity is no exception. In the realm of penetration testing (pentesting), AI-powered tools are becoming indispensable for security professionals seeking to enhance their capabilities and stay ahead of evolving threats. The integration of AI technologies like machine learning (ML) and
pentesting
PentestGPT: Your AI Buddy for Smarter, Faster Hacking
Cybersecurity
The repercussions of failing to protect sensitive data in business have been evident over the years, as major players such as Adobe have been victims of massive data breaches that have affected their bottom lines. Failing to take the right cybersecurity measures comes with significant costs for companies (more than
WordPress
WordPress, one of the most popular content management systems (CMS) in the world, has a rich history dating back to 2003. Its roots can be traced to b2/cafelog, an open-source blogging platform developed by Michel Valdrighi between 2001 and 2003. This precursor laid the foundation for what would become
Self-hosted
What is Cypress Dashboard? Cypress Dashboard is a cloud-based service for managing and analyzing test results from Cypress, a web application testing framework. Key features include: * Test Results Management: Centralized viewing and management of test results * Video and Screenshot Recording: View test recordings directly in the browser * Test Analytics and
RAT (Remote Access Tool)
What Are RATs and Remote Admin Tools? Remote Access Tools (RATs) and Remote Admin Tools are software applications that allow a user to control or monitor another computer remotely. While their functionalities may overlap, their purposes often differ based on the context in which they are used. * Remote Access Tools
Windows
What is Windows Sandbox? Windows Sandbox is a lightweight, transient virtualized environment built right into Windows 10 and Windows 11 for safe execution of applications. It is meant for the secure and isolated running of software that may be risky, so it will not affect the main system. The feature
Cybersecurity
What is SheShell? SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information. Features * IPA generator - All you need to do is generate an IPA file and install it on a target's device via TrollStore or
Cybersecurity
What is the FatRat? TheFatRat is an exploitation and pentesting tool designed for educational purposes. It has the capability to compile malware with popular payloads, which can then be executed on various platforms including Windows, Linux, Mac, and Android. This makes it a versatile tool for understanding the dynamics of
List
Cybersecurity
In the dynamic world of web application security, SQL injection continues to be a dominant threat. Fear not, an abundance of open-source SQL injection tools stands ready to counter this menace. Equipped with diverse functionalities, these tools are designed to pinpoint and attack vulnerabilities, guaranteeing the unassailable strength of your
Vulnerability Scanner
A web application vulnerability scanner is an expertly crafted software program, engineered to methodically scan web applications for security vulnerabilities. It operates with precision, simulating attacks and meticulously observing the application's response to pinpoint potential weak points with absolute certainty. The scanner isn't just helpful, it&
Cybersecurity
RapidScan is a free and open-source multi-tool web app vulnerability scanner, that allows pentesters, web developers and ethical hackers looks for bugs, and security issues in any web app. It is written using Python and can be installed on any system either from source using Python or using Docker. Features