Seccubus:-- #Easily #automated #vulnerability #scanning, #reporting, and #analysis.
#Seccubus automates regular vulnerability scans with various tools and aids #security people in the fast analysis of its output, both on the first scan and on repeated scans.
Seccubus V2 works with the following scanners:-
1. #Nessus
2. #OpenVAS
3. #Skipfish
4. #Medusa (local and remote)
5. #Nikto (local and remote)
6. #NMap (local and remote)
7. #OWASP-ZAP (local and remote)
8. #SSLyze
9. #Medusa
10. #Qualys #SSL labs
11. testssl.sh (local and remote)
#Download #Link:-
https://github.com/seccubus/seccubus
Seccubus:-- #Easily #automated #vulnerability #scanning, #reporting, and #analysis.
#Seccubus automates regular vulnerability scans with various tools and aids #security people in the fast analysis of its output, both on the first scan and on repeated scans.
Seccubus V2 works with the following scanners:-
1. #Nessus
2. #OpenVAS
3. #Skipfish
4. #Medusa (local and remote)
5. #Nikto (local and remote)
6. #NMap (local and remote)
7. #OWASP-ZAP (local and remote)
8. #SSLyze
9. #Medusa
10. #Qualys #SSL labs
11. testssl.sh (local and remote)
#Download #Link:-
https://github.com/seccubus/seccubus
#Seccubus automates regular vulnerability scans with various tools and aids #security people in the fast analysis of its output, both on the first scan and on repeated scans.
Seccubus V2 works with the following scanners:-
1. #Nessus
2. #OpenVAS
3. #Skipfish
4. #Medusa (local and remote)
5. #Nikto (local and remote)
6. #NMap (local and remote)
7. #OWASP-ZAP (local and remote)
8. #SSLyze
9. #Medusa
10. #Qualys #SSL labs
11. testssl.sh (local and remote)
#Download #Link:-
https://github.com/seccubus/seccubus
Seccubus:-- #Easily #automated #vulnerability #scanning, #reporting, and #analysis.
#Seccubus automates regular vulnerability scans with various tools and aids #security people in the fast analysis of its output, both on the first scan and on repeated scans.
Seccubus V2 works with the following scanners:-
1. #Nessus
2. #OpenVAS
3. #Skipfish
4. #Medusa (local and remote)
5. #Nikto (local and remote)
6. #NMap (local and remote)
7. #OWASP-ZAP (local and remote)
8. #SSLyze
9. #Medusa
10. #Qualys #SSL labs
11. testssl.sh (local and remote)
#Download #Link:-
https://github.com/seccubus/seccubus
Photos from National Cyber Security Services's post
Android Application Analyzer:-- The #tool is used to #analyze the content of the #android #application in local storage.
Install the dependency using following #command:-
1. chmod +x setup.sh
2. ./setup.sh
Use the following command to run the tool:
1. python3 main.py
In order to run "Fridump" and "Frida #universal #ssl unpinning" script, #Frida client must be installed on base machine
#Download #Link:-
https://github.com/NotSoSecure/android_application_analyzer
Android Application Analyzer:-- The #tool is used to #analyze the content of the #android #application in local storage.
Install the dependency using following #command:-
1. chmod +x setup.sh
2. ./setup.sh
Use the following command to run the tool:
1. python3 main.py
In order to run "Fridump" and "Frida #universal #ssl unpinning" script, #Frida client must be installed on base machine
#Download #Link:-
https://github.com/NotSoSecure/android_application_analyzer
🛡️أداة testssl لاختبار أمان بروتوكولات SSL/TLS على الخوادم
هي أداة مفتوحة المصدر تُستخدم لاختبار أمان بروتوكولات #ssl/#TLS على الخوادم، تهدف الأداة إلى تحديد نقاط الضعف في تكوينات الأمان وتحليل مستوى الحماية المقدم من قبل الخادم.
رابط تحميل الأداة
https://github.com/drwetter/testssl.sh
〰️➖➖➖➖➖➖〰️
t.me/MuhammadAlush0997
تابعني على :
Telegram | instagram | facebook | Twitter | YouTube
هي أداة مفتوحة المصدر تُستخدم لاختبار أمان بروتوكولات #ssl/#TLS على الخوادم، تهدف الأداة إلى تحديد نقاط الضعف في تكوينات الأمان وتحليل مستوى الحماية المقدم من قبل الخادم.
رابط تحميل الأداة
https://github.com/drwetter/testssl.sh
〰️➖➖➖➖➖➖〰️
t.me/MuhammadAlush0997
تابعني على :
Telegram | instagram | facebook | Twitter | YouTube