Rabu, 04 November 2015 di 12.54 |  

Greeting BinusHacker Family


Berikut ini kita berbagi peralatan atau tools yang biasanya dipakai oleh pentester, hacker, cracker, phiser dan bahkan Anonymous. Detail informasi petunjuk bisa langsung mengunjungi websitenya.
Hacking Tools 2014 – 2015, Cracking Tools 2014 – 2015. Download Hacking Tools 2014 – 2015, Phising Tools 2014 – 2015, Anonymous Hacking Tools 2014 – 2015, Tools Hacking 2014 – 2015, Cracking Tools 2014 – 2015, Tools Cracking 2014 – 2015, Tool Hack 2014 – 2015, Tool Crack 2014 – 2015, Tool Hacking 2014 – 2015, Tool Cracking 2014 – 2015, Tool Hacker 2014 – 2015, Tool Cracker 2014 – 2015, Scanner tools 2014 – 2015, Tools Hacker 2014 – 2015, Tools Cracker 2014 – 2015 yang mungkin bisa bermanfaat untuk bisa anda pakai di 2014 – 2015.
hacking-cracking-pentesting-tools-2015-security-network-vulnerability-scanner-binushacker
Ayo Download Hacking Tools 2014 – 2015 – Hacker Tools 2014 – 2015 – Hack Tool 2014 – 2015 – Hacker Tool 2014 – 2015 – Hacking Tool 2014 – 2015 – Hack Tool 2014 – 2015 – Cracking Tools 2014 – 2015 – Cracker Tools 2014 – 2015 – Cracking Tool 2014 – 2015 – Cracker Tool 2014 – 2015 – Crack Tools 2014 – 2015 – Crack Tool 2014 – 2015. Security tools 2014 – 2015, Scanner tools 2014 – 2015, Vulnerbaility tools 2014 – 2015, Pentester tools 2014 – 2015, Exploit tools 2014 – 2015, Sniffing tools 2014 – 2015, Intrusion tools 2014 – 2015, Ebooks hacking 2014 – 2015, E-book cracking 2014 – 2015, Book blackhat 2014 – 2015, Whitehat tools 2014 – 2015, Blackhat tools 2014 – 2015, Internet tools 2014 – 2015, Network tools 2014 – 2015, Infrastructure tools 2014 – 2015, Firewall tools 2014 – 2015
hacking-2015-cracking-2015-pentesting-2015-tools-2015-security-network-vulnerability-scanner-windows-binushacker

Penetration Testing

  • Metasploit Unleashed – Free Offensive Security metasploit course
  • PTES – Penetration Testing Execution Standard
  • OWASP – Open Web Application Security Project

Shellcode

Social Engineering

Lock Picking

hacker-2015-cracker-2015-pentester-2015-security-network-vulnerability-scanner-tools-2015-binushacker

Tools

Penetration Testing Distributions

  • Kali – A Linux distribution designed for digital forensics and penetration testing
  • BlackArch – Arch Linux-based distribution for penetration testers and security researchers
  • NST – Network Security Toolkit distribution
  • Pentoo – Security-focused livecd based on Gentoo
  • BackBox – Ubuntu-based distribution for penetration tests and security assessments

Basic Penetration Testing

  • Metasploit Framework – World’s most used penetration testing software
  • Burp Suite – An integrated platform for performing security testing of web applications
  • ExploitPack – Graphical tool for penetration testing with a bunch of exploits

Vulnerability Scanners

  • Netsparker – Web Application Security Scanner
  • Nexpose – Vulnerability Management & Risk Management Software
  • Nessus – Vulnerability, configuration, and compliance assessment
  • Nikto – Web application vulnerability scanner
  • OpenVAS – Open Source vulnerability scanner and manager
  • OWASP Zed Attack Proxy – Penetration testing tool for web applications
  • Secapps – Integrated web application security testing environment
  • w3af – Web application attack and audit framework
  • Wapiti – Web application vulnerability scanner
  • WebReaver – Web application vulnerability scanner for Mac OS X
  • Droopescan – Scanner to identify issues with several CMSs, mainly Drupal & Silverstripe
  • Discover – Custom bash scripts used to automate various pentesting tasks

Network Tools

  • nmap – Free Security Scanner For Network Exploration & Security Audits
  • tcpdump/libpcap – A common packet analyzer that runs under the command line
  • Wireshark – A network protocol analyzer for Unix and Windows
  • Network Tools – Different network tools: ping, lookup, whois, etc
  • netsniff-ng – A Swiss army knife for for network sniffing
  • Intercepter-NG – a multifunctional network toolkit
  • SPARTA – Network Infrastructure Penetration Testing Tool
  • Sn1per – Automated Pentest Recon ScannerSn1per – Automated Pentest Recon Scanner

Wireless Network Tools

  • Aircrack-ng – a set of tools for auditing wireless network
  • Kismet – Wireless network detector, sniffer, and IDS
  • Reaver – Brute force attack against Wifi Protected Setup

SSL Analysis Tools

  • SSLyze – SSL configuration scanner
  • sslstrip – a demonstration of the HTTPS stripping attacks

Hex Editors

Crackers

Windows Utils

DDoS Tools

  • LOIC – An open source network stress tool for Windows
  • JS LOIC – JavaScript in-browser version of LOIC

Social Engineering Tools

  • SET – The Social-Engineer Toolkit from TrustedSec

OSInt Tools

  • Maltego – Proprietary software for open source intelligence and forensics, from Paterva.

Anonimity Tools

  • Tor – The free software for enabling onion routing online anonymity
  • I2P – The Invisible Internet Project

Reverse Engineering Tools

  • IDA Pro – A Windows, Linux or Mac OS X hosted multi-processor disassembler and debugger
  • IDA Free – The freeware version of IDA v5.0
  • WDK/WinDbg – Windows Driver Kit and WinDbg
  • OllyDbg – An x86 debugger that emphasizes binary code analysis
  • Radare2 – Opensource, crossplatform reverse engineering framework.
  • x64_dbg – An open-source x64/x32 debugger for windows.
  • Pyew – A Python tool for static malware analysis.
  • Bokken – GUI for Pyew Radare2.
  • Immunity Debugger – A powerful new way to write exploits and analyze malware
  • Evan’s Debugger – OllyDbg-like debugger for Linux

hack-2015-crack-2015-pentest-2015-security-network-vulnerability-scanner-tools-2015-binushacker

Books

Penetration Testing Books

Hackers Handbook Series

Network Analysis Books

Reverse Engineering Books

Malware Analysis Books

Windows Books

Social Engineering Books

Lock Picking Books

hack-crack-pentest-security-network-vulnerability-scanner-tools-2015-binushacker

Vulnerability Databases

Security Courses

Information Security Conferences

  • DEF CON – An annual hacker convention in Las Vegas
  • Black Hat – An annual security conference in Las Vegas
  • BSides – A framework for organising and holding security conferences
  • CCC – An annual meeting of the international hacker scene in Germany
  • DerbyCon – An annual hacker conference based in Louisville
  • PhreakNIC – A technology conference held annually in middle Tennessee
  • ShmooCon – An annual US east coast hacker convention
  • CarolinaCon – An infosec conference, held annually in North Carolina
  • HOPE – A conference series sponsored by the hacker magazine 2600
  • SummerCon – One of the oldest hacker conventions, held during Summer
  • Hack.lu – An annual conference held in Luxembourg
  • HITB – Deep-knowledge security conference held in Malaysia and The Netherlands
  • Troopers – Annual international IT Security event with workshops held in Heidelberg, Germany
  • Hack3rCon – An annual US hacker conference
  • ThotCon – An annual US hacker conference held in Chicago
  • LayerOne – An annual US security conerence held every spring in Los Angeles
  • DeepSec – Security Conference in Vienna, Austria
  • SkyDogCon – A technology conference in Nashville
  • SECUINSIDE – Security Conference in Seoul
  • DefCamp – Largest Security Conference in Eastern Europe, held anually in Bucharest, Romania

Information Security Magazines

Awesome Lists


Credit: Enaqx.GitHub
  • delicious
  • digg
  • facebook
  • reddit
  • stumble
Diposting oleh Sam Lloris Alcatara

0 komentar:

Recent Post

Visit the Site
MARVEL and SPIDER-MAN: TM & 2007 Marvel Characters, Inc. Motion Picture © 2007 Columbia Pictures Industries, Inc. All Rights Reserved. 2007 Sony Pictures Digital Inc. All rights reserved. blogger template by blog forum.