Wordpress Security Services

Ehacking Tutorial

Sysdig - System Exploration & Troubleshooting Tool

sysdig - an open source system-level exploration and troubleshooting tool. Sysdig captures system calls and other system level events using a linux kernel facility called tracepoints, which means much less overhead than strace.

It then "packetizes" this information, so that you can save it into trace files and filter it, a bit like you would do with tcpdump. This makes it very flexible to explore what processes are doing.
Sysdig is also packed with a set of scripts that make it easier to extract useful information and do troubleshooting.

Wireless Network Monitor & Analyzer

CommView for WiFi is a powerful wireless network monitor and analyzer for 802.11 a/b/g/n/ac networks. Loaded with many user-friendly features, CommView for WiFi combines performance and flexibility with an ease of use unmatched in the industry.

PACK - Password Analysis & Cracking Toolkit

PACK (Password Analysis and Cracking Toolkit) is a collection of utilities developed to aid in analysis of password lists in order to enhance password cracking through pattern detection of masks, rules, character-sets and other password characteristics. The toolkit generates valid input files for Hashcat family of password crackers.

peepdf PDF Analysis Tool

peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful or not. The aim of this tool is to provide all the necessary components that a security researcher could need in a PDF analysis without using 3 or 4 tools to make all the tasks. With peepdf it's possible to see all the objects in the document showing the suspicious elements, supports all the most used filters and encodings, it can parse different versions of a file, object streams and encrypted files. With the installation of PyV8 and Pylibemu it provides Javascript and shellcode analysis wrappers too. Apart of this it's able to create new PDF files and to modify/obfuscate existent ones.

WebApp Information Gatherer - WIG

Footprinting and information gathering, the first and most important step of penetration testing. To become a successful ethical hacker you need to implement every step and process of pentesting, not only implement but to implement it efficiently. If we talk about web application penetration testing then it is very important to identify the software running behind a target website, most of the websites are now based on CMS (content management system) so we need to identify the name and version of the CMS.