This website is web service for checking file that you're uploaded is the malicious file or not. It's similar Virustotal.com, try it...
![[ByteScanner] Check your file that dangerous or not](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimqGy-KOzY0yQjtbJQXy6ragE_PTwGv9DpodZ66AzJYPkK7leRvJksOSUsnmTKNVJ-mybWzdWQq6ZQQTEoxeds80OjWq1OR2E36NTxxDuHBjWQ02eoPThbEFo9xV6fkdk7-CbXF1g-zwU/s72-c/ByteScanner.jpg)
This website is web service for checking file that you're uploaded is the malicious file or not. It's similar Virustotal.com, try it...
Sandcat Browser 4 brings unique features that are useful for pen-testers and web developers. Sandcat is built on top of Chromium, the same e...
iodine lets you tunnel IPv4 data through a DNS server. This can be usable in different situations where internet access is firewalled, but D...
WhatWeb identifies websites. Its goal is to answer the question, “What is that Website?”. WhatWeb recognises web technologies including co...
ThreatFactor NSIA is a website scanner that monitors websites in real-time in order to detect defacements, compliance violations, exploits, ...
vFeed is an open source naming scheme concept that provides extra structured detailed 3rd parties references for a CVE entry. While the eme...
JBrute is an open source tool written in Java to audit security and stronghold of stored password for several open source and commercial app...
Sometimes crackme’s or something you might be reversing will constantly bug you due to the excessive usage of f7 & f8. It will be quiet ...
Arachni is a Free/Open Source project, the code is released under the Apache License Version 2.0 and you are free to use it as you see fit....
OWASP Zed Attack Proxy (ZAP) An easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is desi...
What you can do with this? Static analysis: you can do a basic manual code review for decompiled sources to discover hidden communicati...
ADQUISICIÓN Y ANÁLISIS DE LA MEMORIA Set de utilidades que permite la adquisición de la memoria ram para posteriormente hacer un análisis...
Remaster Linux Live CD images for the purpose of creating ready to use security wargames with pre-installed vulnerabilities to exploit. Requ...
SuperPutty Password Decryptor is the Free desktop tool to instantly recover all the login passswords from SuperPutty session history. Super...
We have all heard over and over that SSL without verification is not secure. If an SSL connection is not verified with a cached certificate...
OS X Auditor parses and hashes the following artifacts on the running system or a copy of a system you want to analyze: the kernel extension...
SpearPhisher is a simple point and click Windows GUI tool designed for (mostly) non-technical people who would like to supplement the educ...
OWASP ZAP, una de las herramientas absolutamente indispensable en el arsenal de cualquier pentester, acaba de liberar su versión 2.2.0 Est...
SecureCheq is a fast, simple utility for Windows servers and desktops that answers these questions while it tests for common configuration r...
The Broken Web Applications (BWA) Project is a collection of vulnerable web applications that is distributed on a Virtual Machine. The Brok...
Kautilya is a toolkit which provides various payloads for Teensy device which may help in breaking in a computer. The toolkit is written in...
Facebook Password Dump is the command-line tool to instantly recover your lost Facebook password from popular web browsers and messengers....
Auto extracts EAP 802.1x user names Features Sets up wireless card into monitor mode Lists all APs Associates with AP's you wish Extr...
Nimbostratus are tools for fingerprinting and exploiting Amazon cloud infrastructures. Nimbostratus is the first toolset to help you in the...