Sites com ferramentas de Segurança
É importante notar que vários destes sites possuem EULAs e qualquer consulta/submissão a eles deve ser calculada do ponto de vista da confidencialidade dos dados tratados pelo profissional que está utilizando os serviços.
Série de ferramentas para pentest:
Port Scanner: http://scan.subhashdasyam.com/port-scanner.php
VNC Scanner: http://scan.subhashdasyam.com/vnc-scanner.php
RDP Scanner: http://scan.subhashdasyam.com/remote-desktop-scanner.php
SSH Scanner: http://scan.subhashdasyam.com/ssh-scanner.php
LFI Scanner: http://scan.subhashdasyam.com/lfi-scanner.php
Admin Page Bruter: http://scan.subhashdasyam.com/admin-page-finder.php
Port Scanner: http://scan.subhashdasyam.com/port-scanner.php
VNC Scanner: http://scan.subhashdasyam.com/vnc-scanner.php
RDP Scanner: http://scan.subhashdasyam.com/remote-desktop-scanner.php
SSH Scanner: http://scan.subhashdasyam.com/ssh-scanner.php
LFI Scanner: http://scan.subhashdasyam.com/lfi-scanner.php
Admin Page Bruter: http://scan.subhashdasyam.com/admin-page-finder.php
WordPress Admin Brutter: http://scan.subhashdasyam.com/wordpress-bruter.php
SQLi Dumper: http://scan.subhashdasyam.com/dumper.php
SQLi Dumper with login: http://scan.subhashdasyam.com/dumper-with-login.php
Lista de Sites para localização de informações pessoais (*):
http://computercrimeinfo.com/info.html
http://computercrimeinfo.com/info.html
Análise de IPs/URLs:
Análise de IPs em múltiplas DNSBL (Spam):
http://multirbl.valli.org
http://multirbl.valli.org
Top 20 Malicious Autonomous Systems
http://maliciousnetworks.org
http://maliciousnetworks.org
Análise de Malware em múltiplos Anti-Vírus
http://www.virustotal.com
http://virusscan.jotti.org
http://virscan.org
http://scanner.novirusthanks.org
http://www.virustotal.com
http://virusscan.jotti.org
http://virscan.org
http://scanner.novirusthanks.org
http://www.threatexpert.com
Lista com outros sandboxes: http://www.pentestit.com/list-sandboxes-malware-analysis/
Análise de Documentos Maliciosos
http://www.malwaretracker.com
Lista com outros sandboxes: http://www.pentestit.com/list-sandboxes-malware-analysis/
Análise de Documentos Maliciosos
http://www.malwaretracker.com
http://www.joedoc.org
https://www.vicheck.ca
http://wepawet.iseclab.org
Verificação de Hashes MD5 de arquivos em White/BlackLists:
http://fileadvisor.bit9.com
https://hash.cymru.com
http://isc.sans.edu/tools/hashsearch.html
http://bin-test.shadowserver.org
http://isc.sans.edu/tools/hashsearch.html
https://www.vicheck.ca
http://wepawet.iseclab.org
Verificação de Hashes MD5 de arquivos em White/BlackLists:
http://fileadvisor.bit9.com
https://hash.cymru.com
http://isc.sans.edu/tools/hashsearch.html
http://bin-test.shadowserver.org
http://isc.sans.edu/tools/hashsearch.html
http://www.nsrl.nist.gov/
http://www.bit9.com/products/bit9-global-software-registry.php
https://www.owasp.org/index.php/OWASP_File_Hash_Repository
http://www.bit9.com/products/bit9-global-software-registry.php
https://www.owasp.org/index.php/OWASP_File_Hash_Repository
LM Hash Cracker (XP / rainbowtable)
Lista de Hash Crackers Online (MD5,SHA1&256,NTLM,MySQL)
Outras Listas de Ferramentas Online:
http://www.emersonwendt.com.br/p/pagina-de-ferramentas.html (Emerson Wendt)
http://www.techsupportalert.com/long-list.htm/Probably%20the%20Best%20Free%20Security%20List%20in%20the%20World
http://www.techsupportalert.com/long-list.htm/Probably%20the%20Best%20Free%20Security%20List%20in%20the%20World
Nenhum comentário:
Postar um comentário