Security-Database Blog

CVSS V2.0 Web based calculator released

CVSS stands for Common vulnerability Scoring System. It helps to score vulnerabilities severity and determine urgency of response and patch management. For more advanced information about CVSS Scoring metrics, please refer to http://www.first.org/cvss/.

Read More

Metasploit stable package 3.1 released

The Metasploit Framework ("Metasploit") is a development platform for creating security tools and exploits. Version 3.0 contains 177 exploits, 104 payloads, 17 encoders, and 3 nop modules. Additionally, 30 auxiliary modules are included that perform a wide range of tasks, including host discovery, protocol fuzzing, and denial of service testing

Read More

Search Engine for Exploits and Vulnerabilities

ExploitSearch uses Google engine to search for vulnerabilities from the quality sources on the net.
It grabs only useful information related to the exploit-query. This webbased utility is very handy to find out some old exploits.

Read More

Wfuzz the web bruteforcer v1.4 released

Wfuzz is a tool designed for bruteforcing Web Applications, it can be used for finding resources not linked (directories, servlets, scripts, etc), bruteforce GET and POST parameters for checking different kind of injections (SQL, XSS, LDAP,etc), bruteforce Forms parameters (User/Password), Fuzzing,etc.

Read More

Nmap 4.5x for Ipod and iPhone

Nmap ("Network Mapper") is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source (license).

Read More

Pass-The-Hash Toolkit v1.2 is out

The Pass-The-Hash Toolkit contains utilities to manipulate the Windows Logon Sessions mantained by the LSA (Local Security Authority) component. These tools allow you to list the current logon sessions with its corresponding NTLM credentials (e.g.: users remotely logged in thru Remote Desktop/Terminal Services), and also change in runtime the current username, domain name, and NTLM hashes

Read More

Wifizoo v1.3 released

WifiZoo is a tool to gather wifi information passively

Read More

NetworkView version 3.60 released

NetworkView is an ultra compact network discovery and management tool for Windows.

Read More

Nessus 3.1.9 Beta released

Nessus is the world’s most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the world’s largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications.

Read More

OpenVAS project updates

OpenVAS stands for Open Vulnerability Assessment System and is a network security scanner with associated tools like a graphical user fontend. The core is a server component with a set of plugins to test various vulnerabilities in remote systems and applications.

Read More

NessConnect (former Nessj) 1.0.0 released

Nessconnect is an open-source software package that can connect to a NessusTM or NessusTM compatible server and provides an advanced graphical user interface. It also provides a command line interface, and an application programming interface in Java. Users can create custom scan profiles, generate extensive reports, and perform differential scans and analysis. Nessconnect was previously known as Nessj and Reason.

Read More
... | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 | 83 |...