Pentest Archives - Ibnshehu
Wednesday, October 23, 2019
Home Pentest

Pentest

Penetration testing, also called pen testing or ethical hacking, is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit. Penetration testing can be automated with software applications or performed manually.

threat intelligence

ACT Platform – Open platform for collection and exchange of threat intelligence information

Semi-Automated Cyber Threat Intelligence (ACT) is a research project led by mnemonic as with contributions from the University of Oslo, NTNU, Norwegian Security...
WiFiBroot

WiFiBroot – A WiFi Pentest Cracking Tool For WPA/WPA2

WiFiBroot is built to provide clients all-in-one facility for cracking WiFi (WPA/WPA2) networks. It heavily depends on scapy, a well-featured packet manipulation library...
vulnx

VulnX – Intelligent Bot Auto Shell Injector that detect vulnerabilities in multiple types of...

Vulnx is An Intelligent Bot Auto Shell Injector that detect vulnerabilities in multiple types of Cms, fast cms detection,informations gathering and vulnerabilitie Scanning of the...
yaazhini

Yaazhini – Free Android APK & API Vulnerability Scanner

Yaazhini is a free vulnerability scanner for android APK and API. It is a user-friendly tool that you can easily scan any APK and API of...
bypass-ssl

Bypassing and Disabling SSL Pinning on Android to Perform Man-in-the-Middle Attack

Certificate Pinning is an extra layer of security to achieve protection against man-in-the-middle. It ensures only certified Certificate Authorities (CA) can sign...
webserver

Most Important Web Server Penetration Testing Checklist

Web server penetration testing performing under 3 major category which is identity, Analyse, Report Vulnerabilities such as authentication weakness, configuration errors, protocol Relation vulnerabilities.

Stay connected

0FansLike
1,728FollowersFollow
13,900SubscribersSubscribe

Latest article

DetExploit

DetExploit – Software That Detect Vulnerable Applications, Not-Installed OS Updates And Notify To User

Abstract DetExploit is software that detect vulnerable applications and not-installed important OS updates on the system, and notify them...
PrivExchange

PrivExchange – Exchange Your Privileges For Domain Admin Privs By Abusing Exchange

POC tools accompanying the blog Abusing Exchange: One API call away from Domain Admin. Requirements These tools...
threat intelligence

ACT Platform – Open platform for collection and exchange of threat intelligence information

Semi-Automated Cyber Threat Intelligence (ACT) is a research project led by mnemonic as with contributions from the University of Oslo, NTNU, Norwegian Security...