.

Sharing my Penetration Testing Tools with Source

<<

swissfondue

User avatar

Newbie
Newbie

Posts: 1

Joined: Thu Nov 28, 2013 5:54 am

Post Thu Nov 28, 2013 6:10 am

Sharing my Penetration Testing Tools with Source

After conducting PT's over the last 15 years i have a huge collection of windows and linux tools (a few i already shared here: http://www.netprotect.ch/tools.html) which help you to conduct penetration tests. They cover what backtrack tools, nessus, metasploit and many other cool dev's did not do the job for me.

Tool categories are:
webscanner, smtp scanner, ipv6 scanner, android trojans, stealth keyloggers, stealth remote control software undetectable by AV, vpn scanner, dns scanner, inside out tools to fetch data within protected enviroments, tunneling tools, penetration checklists etc. etc. etc.

All of them have never been published before. I will release them one after the other including source code. Most of them are really easy to use. I started uploading them to code.google.

Here are some of the first uploads:
http://code.google.com/p/dns-informatio ... ring-tool/
http://code.google.com/p/android-security-demo-app/
http://code.google.com/p/ipv6-portable-portscanner/
http://code.google.com/p/smtp-security-scanner/
http://code.google.com/p/swat-web-security-scanner/

The more sophisticated (and dangerous ones) will come later....
<<

prats84

User avatar

Jr. Member
Jr. Member

Posts: 73

Joined: Thu Nov 18, 2010 7:03 pm

Post Thu Nov 28, 2013 6:31 pm

Re: Sharing my Penetration Testing Tools with Source

Thanx :)
<<

Henry864

User avatar

Newbie
Newbie

Posts: 43

Joined: Thu Jul 14, 2016 2:03 am

Post Sat Jul 30, 2016 5:23 am

Re: Sharing my Penetration Testing Tools with Source

It’s the method of testing where the areas of weakness in software systems in terms of security are put to test to determine, if ‘weak-point’ is indeed one, that can be broken into or not.

Step #1. It starts with a list of Vulnerabilities/potential problem areas that would cause a security breach for the systems.
Step #2. If possible, this list of items has to be ranked in the order of priority/criticality
Step #3. Devise penetration tests that would work (attack your system) from both within the network and outside (externally) to determine if you can access data/network/server/website unauthorized.
Step #4. If the unauthorized access is possible, the system has to be corrected and the series of steps need to be re-run until the problem area is fixed.

1) Metasploit
2) Wireshark
3) w3af
4) CORE Impact
5) Back Track

Return to Tools

Who is online

Users browsing this forum: No registered users and 1 guest

.
Powered by phpBB® Forum Software © phpBB Group.
Designed by ST Software