Exploitation Framework for Embedded devices – RouterSploit

The RouterSploit Framework is an open-source exploitation framework devoted to embedded devices. It includes various modules that aid penetration testing operations: exploits – modules that take advantage of identified vulnerabilities creds – modules designed to test credentials against network...
Analyzing embedded files and executable code with Firmware Images

Analyzing embedded files and executable code with Firmware Images – Binwalk

Binwalk is a device for looking a given binary image for embedded documents and executable code. Specifically, it's far designed for figuring out files and code embedded inner of firmware images. Binwalk uses the libmagic library, so it is compatible...

p0f – Passive Traffic Analysis OS Fingerprinting and Forensics Penetration Testing Tool

According to Kali ,P0f is a tool that utilizes an array of sophisticated, purely passive traffic fingerprinting mechanisms to identify the players behind any incidental TCP/IP communications (often as little as a single normal SYN) without interfering in any...
Commix – Automated All-in-One OS Command Injection and Exploitation Tool

Commix – Automated All-in-One OS Command Injection and Exploitation Tool

Commix (short for and njection eploiter) has a simple environment and it can be used, from web developers, penetration testers or even security researchers to test web applications with the view to find bugs, errors or vulnerabilities related to...
DDOS Kali

DDOS a website anonymously by using kali linux

DDOS tools are capable of putting heavy loads on HTTP servers and bring them to their knees by exhausting it's resources. What is DDOS attack? A type of attack where Multiple compromised systems attacking a single target, which denies access to the...

Most Popular

Block title