Yes… simple, smart n powerfull… 😉 not just push button hacker….

PenTBox is a Security Suite with programs like Password Crackers, Denial of Service testing tools (DoS and DDoS), Secure Password Generators, Honeypots and much more. Destined to test security/stability of networks and more. Programmed in Ruby, and oriented to GNU/Linux systems (but compatible with Windows, MacOS and more).

More n downloads: http://www.planetcreator.net/downloads/2010/05/10/pentbox-simple-n-smart-security-tools/

Explore More

US Army banned the use of USB drives from its computers

They say they are the most powerful; they have their units in many countries; they attack anywhere on the globe; they have hundreds of spies and spy satellites all around

What are the various Trojan vectors?

A Trojan may infect any system through Trojan vectors. The most common Trojan vectors are as follows: * Email attachments * Social engineering * NetBIOS remote installation * Physical access

Selection of tools to automate an attack SQL Injection

sqlmap (http://sqlmap.sourceforge.net/) Full support: MySQL, Oracle, PostgreSQL and Microsoft SQL Server. Partially supported: Microsoft Access, DB2, Informix, Sybase and Interbase. SQL Power Injector (http://www.sqlpowerinjector.com/) Implemented support for: Microsoft SQL Server,