Yearly Archives: 2016

/2016

OpenStego: A Steganography Application Tool

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

OpenStego is an open-source software which circulated under the terms of the GNU(General Public License v2.0.)
As well as it is a Steganography application that offers two main functionalities:

Data Hiding: It can hide any data within a cover file such as – images.
Watermarking: Watermarking […]

By |November 17th, 2016|Papers|

WPSCrackGUI: GUI Cracking For WPS Networks Reaver

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

WPSCrackGUI is a graphical interface for wireless networks cracking WPS. And it is based on Reaver as well as it is one of the simplest GUI packages to attack Linux.
And it is also the nicest looking. By this package you can active monitor mode on […]

By |November 17th, 2016|Papers|

T50: Very Fast Network Packet Injector Tool

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

It is the fastest network packet injector. T50 Sukhoi PAK FA is a mixed as well as fastest network packet injector.
Or you can say that it is a kind of a packet injection free which is generated by Brazilian Nelson Brito who is capable of […]

By |November 17th, 2016|Papers|

Matriux: A Fully Featured Security Distribution Cyber Forensic Tool

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Matriux is a GNU/Linux, Debian-based security distribution that is designed for diffusion testing as well as for the investigations of cyber forensic.

But it is a mainly designed for security enthusiasts as well as professionals that can also be used usually as your default OS and […]

By |November 17th, 2016|Papers|

Santoku: Mobile Forensics, Malware Analysis And App Security Testing

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Santoku is an open-source platform that is also very simple to use as well as it dedicated to mobile forensics, analysis, and security.
The word Santoku means that “three virtues” or “three uses.” Santoku  Linux has been designed to you in these three achievements that are […]

By |November 17th, 2016|Papers|

Paros: A Java – Based Web Proxy Tool

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Paros is a Java based HTTP/HTTPS proxy for assessing the vulnerability of web application. And it supports the editing/viewing HTTP/HTTPS messages on-the-fly to modify the items just like cookies as well as form fields.

Whereas it includes many other features such as traffic recorder, web spider, […]

By |November 17th, 2016|Papers|

Malzilla: An Advanced Malware-Hunting Tool

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Malzilla: An Advanced Malware-Hunting Tool
Malzilla is an advanced malware-hunting tool which is specialized for hunting web-based exploits, interpret obfuscated JavaScripts etc.
It can discover the HTML text, hex code, cookies as well as parsed links of web pages to consider any malicious activity by using this […]

By |November 17th, 2016|Papers|

TomCatWarDeployer: Apache Tomcat Auto WAR Deployment And Pwning Penetration Testing Tool

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

TomCatWarDeployer: Apache Tomcat Auto WAR deployment & Pwning Penetration Testing Tool..
Apache Tomcat auto WAR deployment & pwning penetration testing tool.
What is it?

This is a penetration testing tool intended to leverage Apache Tomcat credentials in order to automatically generate and deploy JSP Backdoor, as well as […]

By |November 15th, 2016|Papers|

DMitry A Deepmagic Information Gathering Tool

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

DMitry (Deepmagic Information Gathering Tool) is a UNIX/(GNU) Linux Command Line Application coded in C language.

DMitry has the ability to gather as much information as possible about a host. Base functionality is able to gather possible subdomains, email addresses, uptime information, tcp port scan, whois […]

By |November 15th, 2016|Papers|

Pharming: A Type of Phishing And DNS Poisoning Attack

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Pharming: A Type of Phishing And DNS Poisoning Attack
Pharming is a cyber attack intended to redirect a website’s traffic to another, fake site. Pharming can be conducted either by changing the hosts file on a victim’s computer or by exploitation of a vulnerability in DNS […]

By |November 15th, 2016|Papers|