OWASP Zed Attack Proxy (ZAP) An easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is desi...
![[OWASP Zed Attack Proxy 2.2.1] Tool for finding vulnerabilities in web applications (Now supports CWE)](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhx9duw6pRtiNhwFsaKwcoAeUlP1nFvOvTupG_Rp_V1-XnZldSE1_M0SgDs2DMd6wuyeDDA_f9Rmv0oE3nAGG8m8LdV-aoToqp3ThpzNUICV46T25SJjZX-YiebNquv7oJOUDjTYc-xyrc/s72-c/zap-banner.png)
OWASP Zed Attack Proxy (ZAP) An easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is desi...
What you can do with this? Static analysis: you can do a basic manual code review for decompiled sources to discover hidden communicati...
ADQUISICIÓN Y ANÁLISIS DE LA MEMORIA Set de utilidades que permite la adquisición de la memoria ram para posteriormente hacer un análisis...
Remaster Linux Live CD images for the purpose of creating ready to use security wargames with pre-installed vulnerabilities to exploit. Requ...
SuperPutty Password Decryptor is the Free desktop tool to instantly recover all the login passswords from SuperPutty session history. Super...
We have all heard over and over that SSL without verification is not secure. If an SSL connection is not verified with a cached certificate...
OS X Auditor parses and hashes the following artifacts on the running system or a copy of a system you want to analyze: the kernel extension...
SpearPhisher is a simple point and click Windows GUI tool designed for (mostly) non-technical people who would like to supplement the educ...
OWASP ZAP, una de las herramientas absolutamente indispensable en el arsenal de cualquier pentester, acaba de liberar su versión 2.2.0 Est...