Pablo Gallardo

Pablo Gallardo

Cybersecurity and IT professional. Find more info at pmgallardo.com

List of Rootkits

This is a non-exhaustive list of rootkits available in the market: Horse Pill Grayfish Windows kernel rootkit Sirefef Necurs WingBird Rootkit Avatar Azazel ZeroAccess Alureon List of Rootkits Horse Pill Linux kernel rootkit. Grayfish Windows kernel rootkit Sirefef Necurs …

List of Password Recovery Tools

This post contains a list of password recovery tools, also known as password cracking tools. List of password recovery tools: Passware Kit Forensic ( WINDOWS PASSWORD RECOVERY TOOL ULTIMATE ( Stellar Phoenix Password Recovery ( Windows Password Recovery Tool (…

Vulnerability Assessment Tools for PC

List of vulnerability assessment tools: One of the most popular are Nikto, N-Stalker or Burp Suite. The Open Web Application Security Project (OWASP) maintains a comprehensive list of vulnerability assessment tools: List of vulnerability assessment tools Nessus Web-based. Commercial.…

IT Vulnerability Databases

This post includes a list of  public resources (e.g., databases) for vulnerability research. It also features some well-known sites that are no longer available. CVE Common Vulnerabilities and Exposure (CVE) is managed by MITRE. CVE is funded by the USA…

LDAP Enumeration Tools

This post summarizes some enumeration tools for lightweight directory access protocol (LDAP). To read more about LDAP and Directory Services, please read this post. List of LDAP Enumeration Tools LDAP Enumeration Tools: Softerra LDAP Administrator LDAP Admin Tool LDAP…

SNMP Enumeration Tools

This post features SNMP enumeration tools. List of SNMP Enumeration Tools SNMPUTIL IP Network Browser SNScan Windows-based application. You might also be interested in…