DefenseMatrix – Full security solution for Linux Servers
DefenseMatrix helps individuals and organizations who use Linux to secure their servers on various dimentions automatically. It makes securing a…
Vulnerability Analysis
DefenseMatrix helps individuals and organizations who use Linux to secure their servers on various dimentions automatically. It makes securing a…
Recently a security researcher Ricky Lawshae from Trend Micro discover a critical vulnerability on Linksys Wireless Bridge WVBR0-25 this allows…
Acunetix Manual Tools allow penetration testers to further automated testing. Scan your websites SQL Injection & Blind SQL Injection Cross-site…
idb is a tool to simplify some common tasks for iOS app security assessments and research. Please see the Documentationfor…
Shellsploit let’s you generate customized shellcodes, backdoors, injectors for various operating system. And let’s you obfuscation every byte via encoders.…
Doork is a open-source passive vulnerability auditor tool that automates the process of searching on Google information about specific website…
Static analysis tool to find bugs like a grep unix command, egg modules is a config to find to vulnerabilities…
WiFi arsenal is a pack of various usefull/useless tools for 802.11 hacking Short description: P0cL4bs/3vilTwinAttacker -Framework for Rogue Wi-Fi Access…
Heartbleed Scanner – Network Scanner for OpenSSL Memory Leak (CVE-2014-0160) -t parameter to optimize the timeout in seconds. -f parameter…
The Pitbull and w3tw0rk IRC bots contain a flaw that is triggered as input is not properly sanitized when handling…