Maltego download below, this open source intelligence and forensics application allows for the mining and gathering of information as well as the representation of this information in a meaningful way. The tool is used in online investigations for finding relationships between pieces of information from various sources located on the Internet. It uses the idea […]
vulnerability-assessment
SARA – Security Auditor’s Research Assistant – Network Analysis Tool
[ad] This tool has been around for a LONG time in some form or another, some of you old-skool guys may remember a package called SATAN, this was the best semi-automatic security analysis tool around back then. From SATAN and it’s development came SARA, which is now in it’s 3rd generation. Advanced Research’s philosophy relies […]
OpenVAS – Open Vulnerability Assessment System (Nessus is Back!)
[ad] As you all probably known since version 3 Nessus turned to a proprietary model and started charging for the latest plugins locking most of us out. Now we finally have a new, properly organised forked development with the name of OpenVAS – at last a decent and free Vulnerability Scanner! OpenVAS stands for Open […]
Nessconnect 1.0.1 Released – GUI, CLI & API Client for Nessus
[ad] Nessconnect is an open-source software package that can connect to a Nessus or Nessus compatible server and provides an advanced graphical user interface. It also provides a command line interface, and an application programming interface in Java. Users can create custom scan profiles, generate extensive reports, and perform differential scans and analysis. Nessconnect was […]
SSA Version 1.5.2 – OVAL Vulnerability Assessment Software
SSA (Security System Analyzer) is free non-intrusive OVAL-Compatible software. It provides security testers, auditors with an advanced overview of the security policy level applied. Features : OVAL-compatible product SCAP (Security Content Automation Protocol) Perform a deep inventory audit on installed softwares and applications Scan and map vulnerabilities using non-intrusive techniques based on schemas Detect and […]