-2.9 C
New York
Wednesday, February 20, 2019
Home Search

label/vulnerabilities - search results

If you're not happy with the results, please do another search
TROMMEL - Sift Through Embedded Device Files To Identify Potential Vulnerable Indicators

TROMMEL – Sift Through Embedded Device Files To Identify Potential Vulnerable Indicators

TROMMEL sifts by embedded gadget recordsdata to establish potential susceptible indicators. TROMMEL identifies the next indicators associated to:Secure Shell (SSH) key recordsdata Secure Socket Layer (SSL)...
Fwknop - Single Packet Authorization & Port Knocking

Fwknop – Single Packet Authorization & Port Knocking

fwknop implements an authorization scheme generally known as Single Packet Authorization (SPA) for robust service concealment. SPA requires solely a single packet which is...
ADAPT - Tool That Performs Automated Penetration Testing For WebApps

ADAPT – Tool That Performs Automated Penetration Testing For WebApps

ADAPT is a instrument that performs Automated Dynamic Application Penetration Testing for net purposes. It is designed to extend accuracy, velocity, and confidence in...
Scanner-Cli - A Project Security/Vulnerability/Risk Scanning Tool

Scanner-Cli – A Project Security/Vulnerability/Risk Scanning Tool

The Hawkeye scanner-cli is a mission safety, vulnerability and common threat highlighting software. It is supposed to be built-in into your pre-commit hooks and...
Htcap - A Web Application Scanner Able To Crawl Single Page Application (SPA) In A Recursive Manner By Intercepting Ajax Calls And DOM Changes

Htcap – A Web Application Scanner Able To Crawl Single Page Application (SPA) In...

Htcap is an internet software scanner capable of crawl single web page software (SPA) in a recursive method by intercepting ajax calls and DOM...
Commix v2.7 - Automated All-in-One OS Command Injection And Exploitation Tool

Commix v2.7 – Automated All-in-One OS Command Injection And Exploitation Tool

Commix (brief for and njection eploiter) is an automatic software written by Anastasios Stasinopoulos (@ancst) that can be utilized from net builders, penetration testers...
Snyk - CLI And Build-Time Tool To Find & Fix Known Vulnerabilities In Open-Source Dependencies

Snyk – CLI And Build-Time Tool To Find & Fix Known Vulnerabilities In Open-Source...

Snyk helps you discover, repair and monitor identified vulnerabilities in Node.js npm, Ruby and Java dependencies, each on an advert hoc foundation and as...
Kube-Hunter - Hunt For Security Weaknesses In Kubernetes Clusters

Kube-Hunter – Hunt For Security Weaknesses In Kubernetes Clusters

Kube-hunter hunts for safety weaknesses in Kubernetes clusters. The device was developed to extend consciousness and visibility for safety points in Kubernetes environments. You...
Jackhammer - One Security Vulnerability Assessment/Management Tool To Solve All The Security Team Problems

Jackhammer – One Security Vulnerability Assessment/Management Tool To Solve All The Security Team Problems

One Security vulnerability evaluation/administration instrument to resolve all the safety workforce issues.What is Jackhammer? Jackhammer is a collaboration instrument constructed with an purpose of bridging...
Dawnscanner - Dawn Is A Static Analysis Security Scanner For Ruby Written Web Applications (Sinatra, Padrino And ROR Frameworks)

Dawnscanner – Dawn Is A Static Analysis Security Scanner For Ruby Written Web Applications...

dawnscanner is a supply code scanner designed to evaluation your ruby code for safety points. dawnscanner is ready to scan plain ruby scripts (e.g. command...

HOT NEWS