Security application

146 Pins
 4y
Collection by
an image of a computer screen with some text on it
Sensitive Content Warning
Vxscan - Comprehensive Scanning Tool
the flow diagram for an appliance that is running on windows and macosk
Osmedeus v1.5 - Fully Automated Offensive Security Framework For Reconnaissance And Vulnerability Scanning
Osmedeus v1.5 - Fully Automated Offensive Security Framework For Reconnaissance And Vulnerability Scanning
the logo for sliter, an online gaming platform
Slither v0.6.7 - Static Analyzer For Solidity
Slither v0.6.7 - Static Analyzer For Solidity
an image of a computer screen with the word apip highlighted in red on it
Tarnish - A Chrome Extension Static Analysis Tool To Help Aide In Security Reviews
Tarnish - A Chrome Extension Static Analysis Tool To Help Aide In Security Reviews
the text reads b2r2 is a collection of handy librarians and tools for binary analysis, written purely in f4
B2R2 - Collection Of Useful Algorithms, Functions, And Tools For Binary Analysis
B2R2 - Collection Of Useful Algorithms Functions And Tools For Binary Analysis
the book cover for sockets, shelcode, porting and codeing
Sockets, Shellcode, Porting, and Coding: Reverse Engine…
Sockets, Shellcode, Porting, & Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals by James C. Foster
the book cover for writing security tools and explots, which includes four books
Writing Security Tools and Exploits
Writing Security Tools and Exploits by James C. Foster
the screenshot shows an image of a computer screen with text and numbers on it
Syhunt Community 6.7 - Web And Mobile Application Scanner
Syhunt Community 6.7 - Web And Mobile Application Scanner
a screenshot of a computer screen with many lines and numbers in red on it
YouTube
How do hackers cracks the Software to get fully licensed
a diagram showing the different types of traffic lights and directions for each direction in an intersection
Mitaka - A Browser Extension For OSINT Search
Mitaka - A Browser Extension For OSINT Search
an image of a computer screen with the command window open and it's running
Client Killer – bypass tool for internet cafe clients. – Security List Network™
Client Killer is A Net Cafe client bypass tool. Fully portable, powerful and super beefed up. Complete with array scanners, B-E-A-utiful Flat UI, Stealth Spoofer, and a useful fail safe / panic mode system.
the app is showing an image of a man in green
EVABS - Extremely Vulnerable Android Labs
EVABS - Extremely Vulnerable Android Labs
an open book with colorful text and numbers on the pages, all in different colors
Metame - Metame Is A Metamorphic Code Engine For Arbitrary Executables
Metame - Metame Is A Metamorphic Code Engine For Arbitrary Executables
a man sitting at a computer with the words soc first defense phase on it
SOC First Defense phase – Understanding the Cyber Attack Chain – A Defense Approach with/without SOC
This article will help you to understand the modern cyber threats and the most commonly used attack surfaces behind any malware/cyber-attacks. In most times, the cyber attacks are getting executed in stages. So the SOC team must understand the attack patterns and the attack chain. So breaking the attack chain and averting the criminals intend to […] The post SOC First Defense phase – Understanding the Cyber Attack Chain – A Defense Approach with/without SOC appeared first
an image of a laptop with the text explore module for bluekeep
Metasploit Released Public Exploit Module for BlueKeep RCE Vulnerability in Remote Desktop Protocol
Metasploit published a public exploit for BlueKeep, the exploit module targets 64-bit versions of Windows 7 and Windows 2008 R2. The Bluekeep is a wormable critical RCE vulnerability in Remote desktop services that let hackers access the vulnerable machine without authentication. Successful exploitation of the vulnerability allows a remote attacker to run arbitrary code on […] The post Metasploit Released Public Exploit Module for BlueKeep RCE Vulnerability in Remote Desktop Protocol appea