ICT Security Tools
11.4K views | +0 today
Follow
ICT Security Tools
A collection of best ICT Security Tools + tutorials how to use them...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Scylla – Framework for Penetration Testing

Scylla – Framework for Penetration Testing | ICT Security Tools | Scoop.it
Scylla is another tool that you can use for penetration testing protocols used by different applications. Scylla works with three basic stages, the pre-hack
Gust MEES's insight:

 

Download it at Google Code:

 

https://code.google.com/p/scylla-v1/

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

MagicTree: Data management for penetration testers

MagicTree: Data management for penetration testers | ICT Security Tools | Scoop.it

Have you ever spent ages trying to find the results of a particular portscan you were sure you did? Or grepping through a bunch of files looking for data for a particular host or service? Or copy-pasting bits of output from a bunch of typescripts into a report?

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Hackers pierce network with jerry-rigged mouse • The Register

Hackers pierce network with jerry-rigged mouse • The Register | ICT Security Tools | Scoop.it
When hackers from penetration testing firm Netragard were hired to pierce the firewall of a customer, they knew they had their work cut out. The client specifically ruled out the use of social networks, telephones, and other social-engineering vectors, and gaining unauthorized physical access to computers was also off limits.

Deprived of the low-hanging fruit attackers typically rely on to get a toe-hold onto their target, Netragard CTO Adriel Desautels borrowed a technique straight out of a plot from Mission Impossible: He modified a popular, off-the-shelf computer mouse to include a flash drive and a powerful microcontroller that ran custom attack code that compromised whatever computer connected to it.
more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Kali Linux - the most advanced and state of the art penetration testing distribution available.

Kali Linux - the most advanced and state of the art penetration testing distribution  available. | ICT Security Tools | Scoop.it

From the creators of BackTrack comes Kali Linux, the most advanced and versatile penetration testing distribution ever created. BackTrack has grown far beyond its humble roots as a live CD and has now become a full-fledged operating system. With all this buzz, you might be asking yourself

Gust MEES's insight:

 

From the creators of BackTrack comes Kali Linux, the most advanced and versatile penetration testing distribution ever created. BackTrack has grown far beyond its humble roots as a live CD and has now become a full-fledged operating system. With all this buzz, you might be asking yourself...


more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

OWASP Zed Attack Proxy Project - OWASP

OWASP Zed Attack Proxy Project - OWASP | ICT Security Tools | Scoop.it

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.

 

It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing.

 

ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.

more...
No comment yet.