• Skip to content
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Google Dorks
  • Shodan Queries
  • Malware Sources

PenTestIT

Your source for all things Information Security!

You are here: Home

Sysdig Falco: The Open Source Behavioral Activity Monitor!

Posted: 1 year ago by @pentestit 2049 views
Updated: March 25, 2017 at 10:10 am

Sysdig Falco: The Open Source Behavioral Activity Monitor!

Since my last posts (Anchore & Docker Scan) were about Docker security, I thought I should continue the trend and blog about Sysdig Falco, the open source behavioral activity monitor with container support. Read more about Sysdig Falco: The Open Source Behavioral Activity Monitor!

OWASP Dependency-Check: The Vulnerable Library Detector!

Posted: 1 year ago by @pentestit 2402 views
Updated: March 25, 2017 at 10:12 am

OWASP Dependency-Check: The Vulnerable Library Detector!

At work, I wanted to check if there were any vulnerabilities in the JAVA libraries that were being used. This is when I remembered of an old project - OWASP Dependency-Check. I was pleasantly surprised to see that it was still being updated and maintained by Jeremy Long. It really did work for me and I ended up updating the few libraries that were being used in my project! Read more about OWASP Dependency-Check: The Vulnerable Library Detector!

Anchore – A Open Source Container Inspection & Analysis System!

Posted: 1 year ago by @pentestit 1599 views
Updated: April 5, 2017 at 2:32 am

Anchore – A Open Source Container Inspection & Analysis System!

Wow! It is raining container security suites now! What with our last post being about Dockerscan and this is about Anchore; a robust container analysis, inspection and control system. An automated tweet went out and Scott Francis alerted me about this open source analysis system. I thought of checking it out and here we are. Read more about Anchore – A Open Source Container Inspection & Analysis System!

Dockerscan: A Docker Security Analysis Suite!

Posted: 1 year ago by @pentestit 2154 views
Updated: July 3, 2017 at 4:03 am

Dockerscan: A Docker Security Analysis Suite!

What better way to kick off the first blog post than talk about a tool which deals with Docker security. Docker is an open-source project that automates the deployment of applications inside software containers. These containers bundle up pieces of software in a complete filesystem that has everything it needs to run, so that you can package your applications into a singular unit. This is where Dockerscan comes into the picture. Read more about Dockerscan: A Docker Security Analysis Suite!

First Post at PenTestIT!

Posted: 1 year ago by @pentestit 1035 views
Updated: April 5, 2017 at 2:20 am

First Post at PenTestIT!

Hi there! If you are reading this, that means you cared with what happened to the old PenTestIT. As a matter of factly, after we got hacked, I lost the persuasion of trying to come back. However, the desire of revival was strong all through these three years. With that in mind, I kept on renewing the domain even though I did not use it for anything. Some recent changes changed the desire into action and I went ahead to buy this VPS and brought the domain back online. As you will see, none of Read more about First Post at PenTestIT!

  • « Previous Page
  • Page 1
  • …
  • Page 18
  • Page 19
  • Page 20

Primary Sidebar

Recent Posts

  • List of Adversary Emulation Tools
  • UPDATE: OWASP Dependency-Check 3.1.2
  • AutoSploit = Shodan/Censys/Zoomeye + Metasploit
  • Apache JMeter RMI Code Execution PoC (CVE-2018-1297)
  • UPDATE: Prowler 2.0 Beta

Featured Post

List of Adversary Emulation Tools

List of Adversary Emulation Tools

April 15, 2018 By Black Leave a Comment

Every once in a while, the security industry brings forth a new buzz word and introduces terminologies that sound über cool and generate lot’s of interest. One such word going around now-a-days is automated “adversary emulation“. Let’s first understand what this really means. Adversary emulation/simulation offers a method to test a network’s resilience against anRead more about List of Adversary Emulation Tools

Secondary Sidebar

Categories

  • Docker Security
  • Fuzzing
  • Malware Analysis
  • Open Source
  • OSINT
  • Penetration Testing
  • Reverse Engineering
  • Site News
  • Tool Updates
  • Tools
  • Vulnerability Assessment
  • Web Application Security
  • Wireless

Archives

  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017

Tags

Anchore APT2 Brute Force CloudFlare Cross-Site Scripting Cuckoo Sandbox DataSploit docker dockerscan docker scan FOCA Kali Linux Local File Inclusion malware malware analysis man-in-the-middle Metadata Metasploit Microsoft Windows MicroSploit Nmap open source OSINT OSRFramework OWASP OWASP Dependency-Check penetration testing penetration testing toolkit PowerMeta PowerShell PowerSploit python Raspberry Pi RedSnarf reverse engineering Short Post software composition analysis SQL injection Sysdig Falco vulnerability assessment Web Application Security WiFi Wireshark WordPress WPXF

Copyright © 2018 - PenTestIT | Information shared to be used for LEGAL purposes only!