Tools
3.4K views | +0 today
Follow
Tools
Curated by Emilio
Your new post is loading...
Your new post is loading...
Rescooped by Emilio from Cyber Security & Digital Forensics
Scoop.it!

Top Five Ways the Red Team breached the External Perimeter

I have been performing “red team” breach assessments for many years. Often the goal is penetrating an external network, and gaining access internally to highly classified data, critical systems or…

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Rescooped by Emilio from Cyber Security & Digital Forensics
Scoop.it!

WAFNinja: attack Web Application Firewalls •

WAFNinja: attack Web Application Firewalls • | Tools | Scoop.it
WAFNinja is a CLI tool written in Python. It shall help penetration testers to bypass a WAF by automating steps necessary for bypassing input validation. The tool was created with the objective to be easily extendible, simple to use and usable in a team environment.

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Rescooped by Emilio from Cyber Security & Digital Forensics
Scoop.it!

Some useful forensics tools for your forensics investigation

Some useful forensics tools for your forensics investigation | Tools | Scoop.it

tools, forensics and incident response, forensics - So you're called onsite to a forensics engagement. What do you bring?


Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Scooped by Emilio
Scoop.it!

Cisco Adaptive Wireless Intrusion Prevention System Configuration Guide, Release 7.2.103.0 - Appendix A: wIPS Policy Alarm Encyclopedia [Cisco Adaptive Wireless IPS Software]

Cisco Adaptive Wireless Intrusion Prevention System Configuration Guide, Release 7.2.103.0 - Appendix A: wIPS Policy Alarm Encyclopedia [Cisco Adaptive Wireless IPS Software] | Tools | Scoop.it
more...
No comment yet.
Scooped by Emilio
Scoop.it!

Herramientas para análisis forense de archivos Microsoft Office.

Herramientas para análisis forense de archivos Microsoft Office. | Tools | Scoop.it
Oletools es un conjunto de herramientas escritas en Python para analizar archivos Microsoft OLE2. ( también llamados de almacenamiento estructurado o archivo compuesto de formato binario) y documentos de Micorsoft Office. Permitiendo realizar: análisis de malware, análisis forense y depuración
Emilio's insight:
more...
No comment yet.
Scooped by Emilio
Scoop.it!

PaulSec/awesome-windows-domain-hardening

PaulSec/awesome-windows-domain-hardening | Tools | Scoop.it
awesome-windows-domain-hardening - A curated list of awesome Security Hardening techniques for Windows.
more...
No comment yet.
Scooped by Emilio
Scoop.it!

10 Must-Read Books for Information Security Professionals

10 Must-Read Books for Information Security Professionals | Tools | Scoop.it
We asked industry thought leaders to share their favorite books that changed the way they think about information security. Here's what they had to say.
more...
No comment yet.
Scooped by Emilio
Scoop.it!

urlscan.io - Scan your website

urlscan.io - Scan your website | Tools | Scoop.it
urlscan.io allows you to scan a website and analyze the resources it requests and the domains it contacts. Understand what your website is doing.
more...
No comment yet.
Scooped by Emilio
Scoop.it!

SPARTA | Network Infrastructure Penetration Testing Tool

SPARTA | Network Infrastructure Penetration Testing Tool | Tools | Scoop.it
SPARTA is a python GUI application which simplifies network infrastructure penetration testing by aiding the penetration tester in the scanning and enumeration phase. It allows the tester to save time by having point-and-click access to his toolkit and by displaying all tool output in a convenient way.
Emilio's insight:
more...
No comment yet.
Scooped by Emilio
Scoop.it!

Herramientas para el descubrimiento de subdominios

Herramientas para el descubrimiento de subdominios | Tools | Scoop.it
Todos los frameworks y metodologías existentes para tests de intrusión contemplan en sus fases iniciales el reconocimiento, y dentro del reconocimiento es fundamental el descubrimiento de subdominios ya que puede ayudar a un atacante o auditor a identificar y enumerar distintos sitios web del objetivo, algunos incluso mal configurados y vulnerables.
more...
No comment yet.
Rescooped by Emilio from Advanced Threats,Intelligence Technology,CyberSecurity
Scoop.it!

Installing Caine 8.0 on a virtual machine - Hacking Tutorials

Installing Caine 8.0 on a virtual machine - Hacking Tutorials | Tools | Scoop.it
CAINE stands for Computer Aided Investigative Environment and is a live Linux distro for digital forensics. In this tutorial we install Caine 8.0 on a VM.

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Scooped by Emilio
Scoop.it!

Koodous

Koodous | Tools | Scoop.it
Koodous is a collaborative platform that combines the power of online analysis tools with social interactions between the analysts over a vast APKs repository.
more...
No comment yet.
Scooped by Emilio
Scoop.it!

Herramientas para test de penetración y localización de redes inalámbricas.

Herramientas para test de penetración y localización de redes inalámbricas. | Tools | Scoop.it
Herramientas para test de penetración y localización de redes inalámbricas.
more...
No comment yet.
Scooped by Emilio
Scoop.it!

Great big list of cybersecurity resources

Great big list of cybersecurity resources | Tools | Scoop.it
Beef up your cybersecurity knowledge with this list of cybersecurity resources, including data threats, data breaches, books, jobs, companies and VC funding.
more...
No comment yet.
Scooped by Emilio
Scoop.it!

Run 'Kali Linux' Natively On Windows 10 — Just Like That!

Run 'Kali Linux' Natively On Windows 10 — Just Like That! | Tools | Scoop.it
Kali Linux is now available on Microsoft Store, allowing Windows users to run the best operating system for hacking natively on Windows 10.
more...
No comment yet.
Scooped by Emilio
Scoop.it!

Pwnbox, un Docker con multitud de herramientas hacking

Pwnbox, un Docker con multitud de herramientas hacking | Tools | Scoop.it
Pwnbox es un contenedor Docker que nos permite montar en poco tiempo un completo entorno de hacking ético con las Pwntools instaladas y listas.
more...
No comment yet.
Scooped by Emilio
Scoop.it!

Mumuki: una plataforma argentina para aprender a programar gratis

Mumuki: una plataforma argentina para aprender a programar gratis | La crearon cuatro programadores argentinos; ya se usa en varias universidades y secundarios nacionales; está pensada para ser usada por chicos y chicas de 13 años en adelante - LA NACION
more...
No comment yet.
Rescooped by Emilio from Cyber Security & Digital Forensics
Scoop.it!

A Penetration Testing Checklist For Linux Machine – Intrusion Discovery - GBHackers On Security

A Penetration Testing Checklist For Linux Machine – Intrusion Discovery - GBHackers On Security | Tools | Scoop.it
Since  Already we Discussed  A Penetration Testing Cheat Sheet For Windows Machine – Intrusion Detection , Here we will see the Most Important Linux Machine Pentesting  Checklist On an occasional premise (day by day, week by week, or each time you log on to a framework you oversee) gone through these anomalous behaviour  to search for strange …

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Rescooped by Emilio from Advanced Threats,Intelligence Technology,CyberSecurity
Scoop.it!

PloitKit -The #Hacker's  #ToolBox

PloitKit -The #Hacker's  #ToolBox | Tools | Scoop.it
PloitKit is a Python based GUI tool designed as one-stop for all other softwares..

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Scooped by Emilio
Scoop.it!

Herramientas para analizar APK (app Android)

APK son las siglas de Android Aplication Package. Este tipo de archivo contiene el programa o aplicación que queremos instalar de la misma manera que también el instalador.

Pruébalas con este montón de herramientas sacadas de artículos de DragonJAR | NixBone | Repositorio GIT | Android Arsenal

more...
No comment yet.
Rescooped by Emilio from Cyber Security & Digital Forensics
Scoop.it!

nccgroup/redsnarf : a #pentesting  #tool for #Windows environment

nccgroup/redsnarf : a #pentesting  #tool for #Windows environment | Tools | Scoop.it
redsnarf - RedSnarf is a pen-testing / red-teaming tool for Windows environments

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Rescooped by Emilio from Advanced Threats,Intelligence Technology,CyberSecurity
Scoop.it!

Open Source Steganography Web Service: DarkJPEG

Open Source Steganography Web Service: DarkJPEG | Tools | Scoop.it
Open Source Steganography Web Service: DarkJPEG - DarkJPEG is a new generation open source steganography web service.

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Rescooped by Emilio from Ciberseguridad + Inteligencia
Scoop.it!

8 Maps of the Internet of Things

8 Maps of the Internet of Things | Tools | Scoop.it
Here are seven IoT maps that we have written about on Iot Central. 
Interactive Map of IoT Organizations
IoT and IIOT Cybersecurity Market Map
The Ind…
Via Elisa Vivancos
more...
No comment yet.
Scooped by Emilio
Scoop.it!

22 Popular Computer Forensics Tools

22 Popular Computer Forensics Tools | Tools | Scoop.it
Compilation of the best computer forensic tools on the market.
more...
No comment yet.
Scooped by Emilio
Scoop.it!

GitHub - swisskyrepo/PayloadsAllTheThings: A list of useful payloads and bypass for Web Application Security and Pentest/CTF

GitHub - swisskyrepo/PayloadsAllTheThings: A list of useful payloads and bypass for Web Application Security and Pentest/CTF | Tools | Scoop.it
PayloadsAllTheThings - A list of useful payloads and bypass for Web Application Security and Pentest/CTF
more...
No comment yet.