Home » Tag: goofile

Tag Archives: goofile

Home » Tag: goofile

List of Information Security Audit Tools

List of Information Security Audit Tools

S.No.ToolsOpensource/Licensed
1AcunetixLicensed
2NessusLicensed
3SE-SMSerOpensource
4acccheckopensource
5ace-voipopensource
6Amapopensource
7arp-scanopensource
8Automateropensource
9bing-ip2hostsopensource
10braaopensource
11CaseFileopensource
12CDPSnarfopensource
13cisco-torchopensource
14Cookie Cadgeropensource
15copy-router-configopensource
16DMitryopensource
17dnmapopensource
18dnsenumopensource
19dnsmapopensource
20DNSReconopensource
21dnstraceropensource
22dnswalkopensource
23DotDotPwnopensource
24enum4linuxopensource
25enumIAXopensource
26EyeWitnessopensource
27Faradayopensource
28Fierceopensource
29Firewalkopensource
30fragrouteopensource
31fragrouteropensource
32Ghost Phisheropensource
33GoLismeroopensource
34goofileopensource
35hping3opensource
36ident-user-enumopensource
37InSpyopensource
38InTraceopensource
39iSMTPopensource
40lbdopensource
41Maltego Teethopensource
42masscanopensource
43Metagoofilopensource
44Mirandaopensource
45nbtscan-unixwizopensource
46Nmapopensource
47ntopopensource
48OSRFrameworkopensource
49p0fopensource
50Parseroopensource
51Recon-ngopensource
52SETopensource
53SMBMapopensource
54smtp-user-enumopensource
55snmp-checkopensource
56SPARTAopensource
57sslcauditopensource
58SSLsplitopensource
59sslstripopensource
60SSLyzeopensource
61Sublist3ropensource
62THC-IPV6opensource
63theHarvesteropensource
64TLSSLedopensource
65twofiopensource
66URLCrazyopensource
67Wiresharkopensource
68WOL-Eopensource
69Xplicoopensource
70BBQSQLopensource
71BEDopensource
72cisco-auditing-toolopensource
73cisco-global-exploiteropensource
74cisco-ocsopensource
75cisco-torchopensource
76copy-router-configopensource
77DBPwAuditopensource
78Doonaopensource
79DotDotPwnopensource
80HexorBaseopensource
81Ingumaopensource
82jSQLopensource
83Lynisopensource
84Nmapopensource
85ohrwurmopensource
86openvasopensource
87Oscanneropensource
88Powerfuzzeropensource
89sfuzzopensource
90SidGuesseropensource
91SIPArmyKnifeopensource
92sqlmapopensource
93Sqlninjaopensource
94sqlsusopensource
95tnscmd10gopensource
96unix-privesc-checkopensource
97Yersiniaopensource
98Armitageopensource
99Backdoor Factoryopensource
100BeEFopensource
101Commixopensource
102crackleopensource
103exploitdbopensource
104jboss-autopwnopensource
105Linux Exploit Suggesteropensource
106Maltego Teethopensource
107Metasploit Frameworkopensource
108MSFPCopensource
109RouterSploitopensource
110Airbase-ngopensource
111Aircrack-ngopensource
112Airdecap-ng and Airdecloak-ngopensource
113Aireplay-ngopensource
114Airmon-ngopensource
115Airodump-ngopensource
116airodump-ng-oui-updateopensource
117Airolib-ngopensource
118Airserv-ngopensource
119Airtun-ngopensource
120Asleapopensource
121Besside-ngopensource
122Bluelogopensource
123BlueMahoopensource
124Bluepotopensource
125BlueRangeropensource
126Bluesnarferopensource
127Bullyopensource
128coWPAttyopensource
129crackleopensource
130eapmd5passopensource
131Easside-ngopensource
132Fern Wifi Crackeropensource
133FreeRADIUS-WPEopensource
134Ghost Phisheropensource
135GISKismetopensource
136Gqrxopensource
137gr-scanopensource
138hostapd-wpeopensource
139ivstoolsopensource
140kalibrate-rtlopensource
141KillerBeeopensource
142Kismetopensource
143makeivs-ngopensource
144mdk3opensource
145mfcukopensource
146mfocopensource
147mftermopensource
148Multimon-NGopensource
149Packetforge-ngopensource
150PixieWPSopensource
151Pyritopensource
152Reaveropensource
153redfangopensource
154RTLSDR Scanneropensource
155Spooftoophopensource
156Tkiptun-ngopensource
157Wesside-ngopensource
158Wifi Honeyopensource
159wifiphisheropensource
160Wifitapopensource
161Wifiteopensource
162wpacleanopensource
163apache-usersopensource
164Arachniopensource
165BBQSQLopensource
166BlindElephantopensource
167CutyCaptopensource
168DAVTestopensource
169deblazeopensource
170DIRBopensource
171DirBusteropensource
172fimapopensource
173FunkLoadopensource
174Gobusteropensource
175Grabberopensource
176hURLopensource
177jboss-autopwnopensource
178joomscanopensource
179jSQLopensource
180Maltego Teethopensource
181PadBusteropensource
182Parosopensource
183Parseroopensource
184plecostopensource
185Powerfuzzeropensource
186ProxyStrikeopensource
187Recon-ngopensource
188Skipfishopensource
189sqlmapopensource
190Sqlninjaopensource
191sqlsusopensource
192ua-testeropensource
193Uniscanopensource
194Vegaopensource
195w3afopensource
196WebScarabopensource
197Webshagopensource
198WebSlayeropensource
199WebSploitopensource
200Wfuzzopensource
201WPScanopensource
202XSSeropensource
203zaproxyopensource

A Twitter Bug Left Android Users’ Private Tweets Exposed For 4 Years

Twitter just admitted that the social network accidentally revealed some Android users’ protected tweets to the public for more than 4 years — a kind of privacy blunder that you’d typically expect from Facebook.

When you sign up for Twitter, all your Tweets are public by default, allowing anyone to view and interact with your Tweets. Fortunately, Twitter also gives you control of your information, allowing you to choose if you want to keep your Tweets protected.

Enabling “Protect your Tweets” setting makes your tweets private, and you’ll receive a request whenever new people want to follow you, which you can approve or deny. It’s just similar to private Facebook updates that limit your information to your friends only.

In a post on its Help Center on Thursday, Twitter disclosed a privacy bug dating back to November 3, 2014, potentially caused the Twitter for Android app to disable the “Protect your Tweets” setting for users without their knowledge, making their private tweets visible to the public.

The bug only got triggered for those Android users who made changes to their Twitter account settings, such as changing their email address or phone number associated with their account, using the Android app between November 3, 2014, and January 14, 2019.

Apparently, on January 14, 2019, Twitter rolled out an update for Android application to fix the programming blunder.

Although Twitter did not specify exactly how many Android users were affected by this issue, 4 years is a long time duration, and it’s likely that most users have changed their account settings at least once in that period.

Twitter said the company has reached out to users whom it knows has been affected by the privacy bug.

But since Twitter “can’t confirm every account that may have been impacted,” if you are using Twitter for Android app and your tweets are supposed to be protected, it is definitely a good idea to head on to the “Privacy and Safety” settings of your app and double-check the settings to make sure the “Protect your Tweets” is enabled.

Desktop and iOS users can breathe a sigh of relief, as they were not affected by the bug.

The Twitter bug revelation came at the time when the social network is already under European Union investigation for violating the new General Data Protection Regulation (GDPR) rules.

The new law gives European citizens the right to request their personal data from companies, but when Twitter turned down a researcher’s request for data related to its short URL service, the Irish Data Protection Commission (DPC) opened an investigation.

It seems that the DPC is also aware of the latest privacy bug in the Twitter for Android app, and according to Bloomberg, the commission is currently looking into the matter.

Read More »