Tag application

List of Footprinting Tools

In the context of cybersecurity, footprinting is the technique used for gathering information about computer systems and the entities they belong to. This post lists some footprinting tools. List of footprinting tools List of footprinting tools The most popular are…

List of Cryptanalysis Tools

This post lists cryptoanalysis tools. List of Cryptanalysis Tools List of Cryptanalysis tools: CrypTool CryptoBench Cryptol Ganzúa EverCrack AlphaPeeler Mediggo subCipher The most popular is CrypTool. CrypTool CrypTool is free and open source (FOSS). CryptoBench CryptoBench Cryptol …

List of Disk Encryption Tools

This post lists disk encryption tools. VeraCrypt Symantec Drive Encryption BitLocker Drive Encryption Gilisoft Full Disk Encryption Endpoint Full Disk Encryption Dell Data Protection | Encryption AxCrypt Folder Lock Full Disk Encryption Software SafeGuard Encryption Alertsec DriveCrypt ShareCrypt PocketCrypt DriveCrypt…

List of Wi-Fi Discovery Tools

Computer: inSSIDer Office NetSurveyor Xirrus Wi-Fi Inspector Acrylic Wi-Fi Home WirelessMon Ekahau HeatMapper Vistumbler Wi-Fi Scanner Kismet iStumbler AirRadar 4 Wellenreiter NetStumbler AirCheck G2 Wireless Tester The most popular is inSSIDer Office. Mobile: WifiExplorer WiFi Manager OpenSignalMaps Network Signal Info…

SQL injection detection tools

This post lists some SQL injection detection tools List of SQL injection detection tools List of SQL injection detection tools Among these tools, the most popular are IBM Security AppScan, Acunetix Web Vulnerability Scanner, Snort and SQLiX. SQLiX SQLiX is…