Sicurezza – Tools

Strumenti di sicurezza

Vulnerabilities

CVE – Common Vulnerabilities and Exposures CVE Details – The ultimate security vulnerability data source

Data leaks

Have I been pwned? – Check if your email has been compromised in a data breach Has my email been hacked? – Anonymously check if your email has been compromised

Malware

AV-Comparatives – Indipendent Tests of Anti-Virus Software EICAR – European Expert Group for IT-Security Open Malware – Collection of malware hosted by the Georgia Tech Information Security Center REMnux – Linux Toolkit for Reverse-Engineering and Analyzing Malware

Exploit

BlackArch Linux – Penetration Testing Distribution Exploits Database – Offensive Security’s Exploit Database Archive Kali Linux – Penetration Testing and Ethical Hacking Linux Distribution Metasploit – Penetration testing software PentestBox – Opensource PreConfigured Portable Penetration Testing Environment for Windows OS

Analysis

Insecam – Network live IP video cameras directory Shodan – Search engine for Internet-connected devices MxToolbox – Network diagnostic and lookup tools

Scanner

Hacker Target – Online Vulnerability Scanners IPVoid – IP Address Tools Online Sucuri – Free Website Malware and Security Scanner VirusTotal – Analyze suspicious files and URLs

Removal

Kaspersky – Virus Removal Tool Kaspersky – Rescue Disk McAfee – Stinger Microsoft – Safety Scanner Microsoft – Windows Defender offline Trend Micro – Anti-Threat Toolkit Trend Micro – Rescue Disk Sophos – Virus Removal Tool Sophos – Bootable Anti-Virus Symantec – Norton Power Eraser Symantec – Norton Bootable Recovery Tool No More Ransom Project- Decryption Tools

Submission

Kaspersky – VirusDesk McAfee – Submit a Virus or Malware Sample Microsoft – Submit a file for malware analysis Trend Micro – Files to Submit for Analysis Sophos – Submit a Sample Symantec – Submit Virus Samples No More Ransom Project- Report a Crime No More Ransom Project- Crypto Sheriff