Security+ Domain #4: Application, Data, and Host Security
Application, data, and host Security falls into the fourth domain of CompTIA’s Security+ exam (SYO-401) and contributes 15% to the
Read MoreApplication, data, and host Security falls into the fourth domain of CompTIA’s Security+ exam (SYO-401) and contributes 15% to the
Read MoreIntroduction Threats and vulnerabilities fall into the third domain of CompTIA’s Security+ exam (SYO-401) and contribute 20% to the exam
Read MoreCompliance and operations security falls into the second domain of CompTIA’s Security+ exam (SYO-401) and contributes 18% to the exam
Read MoreIntroduction Network security falls into the first domain of CompTIA’s Security+ exam (SYO-401) and contributes 20% to the exam score.
Read MoreNmap Scripting Engine Search Description Nsearch is a tool that helps you to find scripts that are used by nmap
Read MoreMISP – Malware Information Sharing Platform and Threat Sharing MISP, Malware Information Sharing Platform, and Threat Sharing is an open
Read MoreCSRFT – Cross Site Request Forgeries (Exploitation) Toolkit Introduction Description This project has been developed to exploit CSRF Web vulnerabilities
Read MoreManticore is a prototyping tool for dynamic binary analysis, with support for symbolic execution, taint analysis, and binary instrumentation. Features
Read MoreSecurity Monkey Security Monkey monitors your AWS and GCP accounts for policy changes and alerts on insecure configurations. It provides a
Read MoreBurp Suite extension is able to find reflected XSS on page in real-time while browsing on web-site and include some
Read MoreOne stop tool for auditing the security posture of AWS. Pre-requisites Python 2.7 pip git Installation git clone https://github.com/SecurityFTW/cs-suite.git cd
Read MoreBash script purposed for system enumeration, vulnerability identification and privilege escalation. MIDA Multitool draws functionality from several of my
Read MoreSeccubus automates regular vulnerability scans with various tools and aids security people in the fast analysis of its output, both
Read MorePHP Secure Configuration Checker Check current PHP configuration for potential security flaws. Simply access this file from your web server
Read MoreROCA detection tool This tool is related to ACM CCS 2017 conference paper #124 Return of the Coppersmith’s Attack: Practical Factorization
Read MoreMail Header Analyzer (MHA) What is MHA: Mail header analyzer is a tool written in [flask] (http://flask.pocoo.org/) for parsing email
Read MoreA virtual host scanner that can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages. First
Read MoreCyberScan is an open source penetration testing tool that can analyse packets , decoding , scanning ports, pinging and geolocation
Read MoreProgramming Languages : BASH RUN root@ismailtasdelen:~# bash ./anti-ddos.sh Cloning an Existing Repository ( Clone with HTTPS ) git clone https://github.com/ismailtasdelen/Anti-DDOS.git
Read MoreModern organizations are facing more security threats than ever before. Data breaches and systematic hacks of company resources are becoming
Read MoreRather than heavily protecting backdoors with hardcore packers, many malware authors evade heuristic detections by obfuscating only key portions
Read MoreΝέο Wireshark 2.4.2! Το Wireshark είναι ένα freeware εργαλείο για την παρακολούθηση δικτύων. Μπορεί να σας βοηθήσει στον εντοπισμό προβλημάτων,
Read More#micetrap ___ .-| | |_/,| (\ { | | |o o |__ _) ) “-.|___| _.( T ) / .–‘–.
Read MoreGSM Assessment Toolkit – GAT GAT is an evaluation framework for assessing security-related aspects of mobile networks based on the
Read MoreOS X Auditor is a free Mac OS X computer forensics tool. OS X Auditor parses and hashes the following
Read MoreThe Port Scan Attack Detector psad is a lightweight system daemon written in is designed to work with Linux iptables/ip6tables/firewalld
Read MoreA script to find admin login pages and EAR vulnerabilites. Features Multi-threading on demand Big path list (798 paths) Supports
Read MoreTrity Trity is an advanced pentesting framework dedicated to everything from vulnerability testing to cryptography. Installation & Usage In order
Read Morepentest-machine Automates some pentesting work via a nmap XML file. As soon as each command finishes it writes its output
Read Moreburplay Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose
Read More