Skip to main content

InfoSec Tools

Open-source intelligence (OSINT) tools like Infoga, Octoparse, and Splint allow the gathering of publicly available information from the internet for research, trend tracking, and competitive analysis. By leveraging these tools responsibly to extract data from public sources, organizations can gain valuable insights for making informed decisions and keeping up with technological and societal trends. However, these powerful technologies must be utilized legally and ethically.


AlienVault Unified Security Management (USM)AlienVault Unified Security Management (USM) offers powerful threat detection, incident response, and compliance management across cloud, on-premises, and hybrid environments.
Active Directory (AD)Attackers perform Active Directory (AD) enumeration to extract sensitive information such as users, groups, domains, and other resources from the target AD environment. Attackers enumerate AD using PowerShell tools such as PowerView.
Checkmarx CxSASTCheckmarx CxSAST is a unique source-code analysis solution that provides tools for identifying, tracking, and repairing technical and logical flaws in source code, such as security vulnerabilities, compliance issues, and business logic problems.
DPATDPAT is a Python script that generates password use statistics from password hashes dumped from a domain controller (DC) and a password crack file such as hashcat.pot generated using the hashcat tool during password cracking.
FiddlerFiddler is used for performing web-application security tests such as the decryption of HTTPS traffic and manipulation of requests using an MITM decryption technique.
InfogaInfoga is a tool used for gathering email account information (IP, hostname, country, etc.) from different public sources (search engines, PGP key servers, and Shodan), and it checks if an email was leaked using the haveibeenpwned.com API.
MaltegoMaltego is a program that can determine the relationships and real-world links between people, groups of people, organizations, websites, Internet infrastructure, and documents.
OctoparseOctoparse offers automatic data extraction, as it quickly scrapes web data without coding and turns web pages into structured data. As shown in the screenshot, attackers use Octoparse to capture information from webpages, such as text, links, image URLs, or HTML code.
ScranosScranos is a trojanized rootkit that masquerades as cracked software or a legitimate application, such as anti-malware, a video player, or an ebook reader, to infect systems and perform data exfiltration that damages the reputation of the target and steal intellectual property.
SplintSplint can detect common security vulnerabilities including buffer overflows.
Spytech SpyAgentSpytech SpyAgent is computer spy software that allows you to monitor everything users do on your computer—in total secrecy.
StegoStickStegoStick is a steganographic tool that allows attackers to hide any file in any other file.

Comments

Popular posts from this blog

Strip down a Website example, a.k.a. Reverse Engineering skill UNLOCKED

 🧠 How a Website Really Works — Broken Down Simply When you open a website like www.example.com , a lot goes on under the hood — but let’s strip it down to the core parts so you see exactly how it runs from top to bottom. 📍 Step 1: You Type a Website into Your Browser When you type a URL (like https://frizasecurity.com ) into your browser and hit Enter, the first thing that happens is: ✅ The browser needs to find the website's IP address. Think of the domain name (like frizasecurity.com ) as a contact name in your phone, and the IP address as the phone number. Your browser asks a DNS server (Domain Name System) to find the number behind that name. You type the name → Browser says: “What’s the IP address for this?” DNS responds: “Here it is: 123.456.789.10 .” 💡 DNS = like the internet’s phone book. 🔄 Step 2: Your Device Talks to the Server Now that your browser knows the IP address, it sends a request to the web server that hosts the site. Think of the...

How to maintain your senior dog.

 So from what I searched from the internet, Microsoft's Search Engine (SE), Bing, "What dogs require to live a long time" and here's what I got. From PetMD , titled "21 Longest-Living Dog Breeds", says on a list, 1. Chihuahua. Life expectancy: 14-16 years. ..." I'mma stop right there. I have an 11-year-old senior chihuahua. If you want to know more about the list, click the link in the text.  #Bluehyperlink, thanks.  Chleo is the name of my dog. I've been trying to change it to Cleo, short for Cleopatra but no matter the case, it's always going to be Chleo. This is her: I believe she's young, healthy, and I'd like to keep my senior dog young forever! T.T, nothings impossible! Anyways, because she is a chihuahua, one mixed with wiener dog. I don't know if that makes a difference but maybe it does to prevent complications. No boast. She cries when my family and I leave for a vacay, I hear that she cries or even howls. Now, she crie...

Stitched 'X'

The doll lay down on the floor with its deep diamond aquatic eyes, placed on a pile of clothes as I folded them while sitting down. Something about it was deep, I thought. Until I heard someone or something step inside the room. Then I heard a mediocrely heavy door shut, thinking that it was on its own at the time without using context. The one who shut the door was a man that I knew who was doing his best to stand tall. In fact, maybe as the tallest in the room. As soon as I tried to greet him back into our home, my heart felt heavy. When I tried to open my mouth, even a peep... I felt something familiar as if my heart was about to ache. I couldn't speak, and my heart had started aching. Afraid, not wanting to tell my partner, I had remembered the promise I made to him. So I told him everything and when I did, my breath was shallow, and my heart was hurting again. Although, he looked down on me from his height when I stood up. He didn't want me to say a word to him like usual....