Baza danych exploitów – vulners.com
Baza danych zawierająca kilkaset tysięcy exploitów:
https://vulners.com/landing
Przykład ich wykorzystania w połączeniu z nmap:
https://github.com/vulnersCom/nmap-vulners
Baza danych zawierająca kilkaset tysięcy exploitów:
https://vulners.com/landing
Przykład ich wykorzystania w połączeniu z nmap:
https://github.com/vulnersCom/nmap-vulners
https://www.owasp.org/index.php/OWASP/Training/OWASP_WebGoat_Project
Interesting but dangerous software
https://www.schneier.com/blog/archives/2006/08/usbdumper_1.html
1. Oprogramowanie AdwCleaner
2. Malwarebytes – malwarebytes.org
3. Revouninstaller – revouninstaller.com
3. Immunet by SourceFire – immunet.com
5. Wyczyszczenie przeglądarki
Do poczytania:
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project
One of the best blog about practical security – https://www.schneier.com/
Find your wifi https://wigle.net/
Locating Databases on the Network
You can download from the vendor`s website: http://www.vulnerabilityassessment.co.uk
www.openssl.org – OpenSSL, an open source toolkit
www.nessus.org – Nessus Vulnerability Scanner
www.securiteinfo.com/outils/WinSSLMiM.shtml – which can be used to perform an HTTPS man-in-the-middle attack
www.stunnel.org – a program that allows the encryption of non-SSL-aware
Are you on shodan website?
https://iotscanner.bullguard.com/
If you want more secure your browser, you should install add-ons on firefox or chrome like:
Systems and security tools: