Tag applications

List of Footprinting Tools

In the context of cybersecurity, footprinting is the technique used for gathering information about computer systems and the entities they belong to. This post may mix footprinting and reconnaissance tools. This post lists some footprinting tools. List of footprinting tools…

List of Cryptanalysis Tools

This post lists cryptoanalysis tools. List of Cryptanalysis Tools List of Cryptanalysis tools: CrypTool CryptoBench Cryptol Ganzúa EverCrack AlphaPeeler Mediggo subCipher The most popular is CrypTool. CrypTool CrypTool is free and open source (FOSS). CryptoBench CryptoBench Cryptol …

List of Wi-Fi Discovery Tools

Computer: inSSIDer Office NetSurveyor Xirrus Wi-Fi Inspector Acrylic Wi-Fi Home WirelessMon Ekahau HeatMapper Vistumbler Wi-Fi Scanner Kismet iStumbler AirRadar 4 Wellenreiter NetStumbler AirCheck G2 Wireless Tester The most popular is inSSIDer Office. Mobile: WifiExplorer WiFi Manager OpenSignalMaps Network Signal Info…

SQL injection detection tools

This post lists some SQL injection detection tools List of SQL injection detection tools List of SQL injection detection tools Among these tools, the most popular are IBM Security AppScan, Acunetix Web Vulnerability Scanner, Snort and SQLiX. SQLiX SQLiX is…