course module & Tools
Ethical Hacking

This is an app to give basic knowledge for Ethical Hacking... to be a ethical hacker , you need to know the skills and tricks followed by the hacker. So this app gives the information and basic procedure for self teaching your hacking and how to prevent it . The app or the owner of the app is not responsible if any nonlegal or unwanted works are committed using this app , the app is only for educational purpose of ETHICAL hacking.

S.NOTOOL NAMEDISCRIPTIONDOWNLOAD
1 Whois.domaintools.com
  1. WHOIS records vary between registrars, but they all contain mandatory information.
  2. This includes the name of the registrar, created date, updated date, and expiration date of the domain name.
2 Samspade
  1. Sam Spade was the name of a Windows software tool designed to assist in tracking down sources of e-mail spam.
3 People search
  1. Pipl is the place to find the person behind the email address, social username or phone number.
4 Dirbuster
  1. DirBuster is a multi threaded java application designed to brute force directories and files names on web/application servers
5 Spokeo
  1. spokeo is a people search engine that organizes white pages listings, public records and social network information into simple profiles to help you safely find and learn about people.
6 Maltegeo
  1. Maltego focuses on providing a library of transforms for discovery of data from open sources, and visualizing that information in a graph format, suitable for link analysis and data mining.
7 NMAP
  1. Nmap sends specially crafted packets to the target host(s) and then analyzes the responses.
  2. A number of features for probing computer networks, including host discovery and service and operating-system detection.
8 Colasoft ping tool
  1. it is ping sweep tool ,this is build-in tool, users are able to ping the IP addresses of captured packets in a protocol analyzer (e.g. Colasoft Capsa) conveniently, including resource IP, destination IP or both.
9 Dimtry
  1. Dmitry (Deep magic Information Gathering Tool) is a UNIX/(GNU)Linux Command Line Application coded in C.
  2. Dmitry has the ability to gather as much information as possible about a host.
11 Netsparker
  1. it is a dead accurate automated scanner that will identify vulnerabilities such as SQL Injection and Cross-site Scripting in web applications and web APIs.
  2. Netsparker uniquely verifies the identified vulnerabilities proving they are real and not false positives.
12 Acunetix-
  1. It is a fully automated web vulnerability scanner that detects and reports on over 4500 web application vulnerabilities including all variants of SQL Injection and XSS.
13 Open vas-
  1. OpenVAS serves as a central service that provides tools for both vulnerability scanning and vulnerability management and OpenVAS services are free of cost and are generally licensed under GNU General Public .
14 Nikto
  1. It is a very admired and open source web scanner used to assess the probable issues and vulnerabilities and is used to carry out wide-ranging tests on web servers to scan various items like few hazardous programs or files.
15 Sqlmap
  1. open source software
    1. detect and exploit database vulnerabilities.
    2. provides ways for injecting malicious codes.
    3. Penetration Testing tool.
    4. injection techniques like boolean,error,stack,time,union.
16 Image hide
  1. image hide is a Stenography Tool
17 Brutus
  1. brutus is a Password Cracking tool
18 LC5 password cracker
  1. LC5 password cracker is a System hacking tool.
19 Wapiti
  1. It can detect following vulnerabilities:
  2. File Disclosure
  3. File inclusion
  4. Cross Site Scripting (XSS)
  5. Command execution detection
  6. CRLF Injection
  7. SEL Injection and Xpath Injection
20 Backup files disclosure
  1. Wapiti is also a nice web vulnerability scanner which lets you audit the security of your web applications.
  2. It performs black-box testing by scanning web pages and injecting data.
  3. It tries to inject payloads and see if a script is vulnerable.
21 ZED attack proxy
  1. It can be used to find SQL injection, header injection, directory listing, shell injection, cross site scripting, file inclusion and other web application vulnerabilities
22 Vega
  1. It can be used to find SQL injection, header injection, directory listing, shell injection, cross site scripting, file inclusion and other web application vulnerabilities
23 Nexpose
  1. Nexpose to scan a network for vulnerabilities.
  2. Nexpose identifies the active services, open ports, and running applications on each machine, and it attempts to find vulnerabilities that may exist based on the attributes of the known services and applications.
24 Openvas
  1. OpenVAS (Open Vulnerability Assessment System, originally known as GNessUs) is a software framework of several services and tools offering vulnerability scanning and vulnerability management.
25 Acunetix
  1. Acunetix is the leading web vulnerability scanner used by serious Fortune 500 companies and widely acclaimed to include the most advanced SQL injection and XSS black box scanning technology.
26 Wp-scan
  1. WPScan is a black box WordPress vulnerability scanner that can be used to scan remote WordPress installations to find security issues
27 JOOMSCAN
  1. Joom scanOWASP JoomScan (short for [Joom]la Vulnerability [Scan]ner) is an opensource project in perl programming language to detect Joomla CMS vulnerabilities and analysis them.
28 Appie
  1. Appie is a software package that has been pre-configured to function as an Android Pentesting Environment on any windows based machine without the need of a Virtual Machine(VM) or dualboot.
29 Appium
  1. Appium aims to automate any Mobile app from any language and any test framework, with full access to back-end APIs and DBs from test code.
  2. Write tests with your favorite dev tools using all the above programming languages, and probably more (with the Selenium WebDriver API and language-specific client libraries).
30 Santoku
    It is used for many purposes such as Mobile forensics
  1. Tools to acquire and analyze data
  2. Firmware flashing tools for multiple manufacturers
  3. Imaging tools for NAND, media cards, and RAM
31 Mobsf
  1. Mobile Security Framework is an automated, all-in-one Mobile application (Android/iOS/Windows) pen-testing framework capable of performing static analysis, dynamic analysis, malware analysis and web API testing.
32 Appuse
  1. AppUse is a VM (Virtual Machine) developed by AppSec Labs.
  2. It is a unique platform for Mobile application security testing, Android and iOS applications and includes exclusive custom-made tools and scripts created by AppSec Labs.
33 Oxygen
  1. Oxygen is an open source framework and tool-set built on top of Appium, WebdriverIO, and Selenium that significantly simplifies writing and running web automation tests.
  2. It implements many commonly recurring patterns out-of-the-box and hides complexities of the above backends behind a concise API.
34 DirBuster
  1. DirBuster searches for hidden pages and directories on a web server.
  2. Sometimes developers will leave a page accessible, but unlinked; DirBuster is meant to find these potential vulnerabilities.
  3. This is a Java application developed by OWASP.
35 Burp
  1. Burp Suite is an integrated platform for attacking web applications.
36 Amap
  1. Amap is a next-generation tool for assisting network Penetration Testing. It performs fast and reliable application protocol detection; independently of the TCP/UDP port they are being bound to.
37 GFI LanGuard
  1. GFI LanGuard provides a detailed analysis of the state of your network. This includes applications or default configurations posing a security risk.
  2. GFI LanGuard also gives you a complete picture of installed applications; hardware on your network; Mobile devices that connect to the Exchange servers; the state of security applications (antivirus, anti-spam, firewalls, etc.); open ports; and any existing shares and services running on your machines.
38 SPARTA
  1. SPARTA is a python GUI application which simplifies network infrastructure Penetration Testing by aiding the penetration tester in the scanning and enumeration phase.
  2. It allows the tester to save time by having point-and-click access to his toolkit and by displaying all tool output in a convenient way.
  3. If little time is spent setting up commands and tools, more time can be spent focusing on analysing results.
39 Aircrack
  1. Aircrack-ng is a complete suite of tools to assess WiFi network security.
    • It focuses on different areas of WiFi security:
  2. Monitoring: Packet capture and export of data to text files for further processing by third party tools.
  3. Attacking: Replay attacks, deauthentication, fake access points and others via packet injection.
  4. Testing: Checking WiFi cards and driver capabilities (capture and injection).
40 Wireshark Wireshark is very similar to tcpdump, but has a graphical front-end, plus some integrated sorting and filtering options. Wireshark put network interface controllers into promiscuous mode (if supported by the network interface controller), so you can see all the traffic visible on that interface including unicast traffic not sent to that network interface controller's MAC address.

Our Workshops

We have years of experience in handling lots of Ethical Hackingprojects. We are targeting the major states and cities of India for Ethical Hackingworkshops including Delhi,Mumbai, Bangalore,Dhumka, Tamil Nadu, Punjab, Gujarat, Pune, Lucknow, Haryana, Rajasthan, Karnataka, Kerala, Andhra Pradesh, Orissa, Goa, Madhya Pradesh, etc.

Bytecode Cyber Security PARTNERS / CLIENTS

Our GALLERY