Security-Database Blog

CVSS (Common Vulnerability Scoring System ) Version 2.0 released

The Common Vulnerability Scoring System (CVSS) provides an open framework for communicating the characteristics and impacts of IT vulnerabilities. CVSS consists of 3 groups: Base, Temporal and Environmental.

Read More

Security-Database.com new Web Site online

Security-Database.com is happy to announce the release of the 3rd version of the Website.

Read More

Tcpdump 3.9.6 and Libpcap 0.9.6 released

tcpdump is a common computer network debugging tool that runs under the command line. It allows the user to intercept and display TCP/IP and other packets being transmitted or received over a network to which the computer is attached

Read More

Sara version 7.4.1a released

The Security Auditor’s Research Assistant (SARA) is a third generation network security analysis tool. It is Based on the SATAN model

Read More

FireCAT 1.1 Firefox Catalog of Auditing exTensions available

FireCAT is a Firefox Framework Map collection of the most useful security oriented extensions.

Read More

W3af Framework for Web Application Auditing.

W3af is a fully automated auditing and exploiting framework for
the web. It is based upon plugins integration using known GPL tools as well as pytko, Hmap and google utilities .... W3af is written in Python.

Read More

Nessj Version 0.7 : Java Nessus Client

Nessj is an application/network security scanner client for Nessus and Nessus compatible (OpenVAS etc.) servers. In addition to an improved user interface, it provides session management with templates, report generation using XSLT including charts/graphs, and vulnerability trending. It is cross-platform, with platform specific releases available for Linux, OSX, and Windows, written in Java using SWT for a native experience, and it is open-source. It’s provided by Intekras, Inc. under the Clarified Artistic License.

Read More

Nessus 3.1.4 Beta released

Nessus is the world’s most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the world’s largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications.

Read More

RevHosts 2.0 for Pentest Information Gathering

Revhosts is a project for Passive information Gathering, it help
pentesters to find informations (Host, VirtualHost, DNS entry,
Directories, mail address, subnet,..).

Read More

THC-Orakel : Cracking Oracle Password within seconds

THC further releases practical tools to sniff and crack the
password of an oracle database within seconds.

Read More

Network Security Toolkit: NST v1.5.0 released

The Network Security Toolkit is a bootable ISO live CD is based on Fedora Core 6. The toolkit was designed to provide easy access to best-of-breed Open Source Network Security Applications and should run on most x86 platforms.

Read More
... | 90 | 91 | 92 | 93 | 94 | 95 | 96 | 97 | 98 |...