top of page

Awareness and Training

Awareity MOAT

www.awareity.com

Greenidea Visible Statement

www.greenidea.com

Interpact, Inc. Awareness Resources

www.thesecurityawarenesscompany.com

Bluetooth

Bluesnarfer

www.alighieri.org/tools/bluesnarfer.tar.gz

Detailed presentation on the various Bluetooth attacks

http://trifinite.org/Downloads/21c3_Bluetooth_Hacking.pdf

 

Certifications

Dictionary Files and Word Lists

ftp://ftp.cerias.purdue.edu/pub/dict

www.outpost9.com/files/WordLists.html

Exploit Tools

CORE IMPACT

www.coresecurity.com

General Research Tools

AfriNIC

www.afrinic.net

APNIC

www.apnic.net

CERT/CC Vulnerability Notes Database

www.kb.cert.org/vuls

Common Vulnerabilities and Exposures

http://cve.mitre.org/cve

DNSstuff.com

www.DNSstuff.com

Google

www.google.com

Government domains

www.dotgov.gov

LACNIC

www.lacnic.net

NIST National Vulnerability Database

http://nvd.nist.gov

RIPE Network Coordination Centre

www.ripe.net/whois

SecurityTracker

http://securitytracker.com

U.S. Patent and Trademark Office

www.uspto.gov

U.S. Search.com

www.ussearch.com

U.S. Securities and Exchange Commission

www.sec.gov/edgar.shtml

Whois.org

www.whois.org

Yahoo! Finance site

http://finance.yahoo.com

Hacker Stuff

Hacker T-shirts, equipment, and other trinkets

www.thinkgeek.com

Wireless Networks

AirMagnet Laptop Analyzer

www.airmagnet.com/products/laptop.htm

Kismet

www.kismetwireless.net

WiGLE database of wireless networks at

www.wigle.net

Debian Linux Security Alerts

www.debian.org/security

Metasploit

www.metasploit.com

Network Security Toolkit

www.networksecuritytoolkit.org

Tiger

ftp.debian.org/debian/pool/main/t/tiger

Risk Analysis and Threat Modeling

SecureITree

www.amenaza.com

Software Engineering Institute's OCTAVE methodology

www.cert.org/octave

 

Voice over IP

NIST's SP800-58 document

http://csrc.nist.gov/publications/nistpubs/800-58/SP800-58-final.pdf

 

Web Applications and Databases

Acunetix Web Vulnerability Scanner

www.acunetix.com

HTTrack Website Copier

www.httrack.com

Netcraft

www.netcraft.com

N-Stealth Security Scanner

www.nstalker.com/eng/products/nstealth

Paros Proxy Alternatives

https://www.comparitech.com/net-admin/paros-proxy-alternatives/

WebGoat

www.owasp.org/index.php/Category:OWASP_WebGoat_Project

Windows

DumpSec

www.somarsoft.com

FileLocator Pro

www.mythicsoft.com/filelocatorpro

Metasploit

www.metasploit.com

Network Users

www.optimumx.com/download/netusers.zip

bottom of page
Cookie Settings