Go to main content
Home

Home
  • Home
  • CYBER-ACTU
  • CYBER
    • CYBERDOC
    • BUSINESS ANALYTICS
    • CYBERJURIDICTION
    • CYBERINTERVIEW
    • ECONOMICS OF CYBERSECURITY
    • GEOCYBER & CYBERSTRATEGY
  • GOOD PRACTICES
    • CYBER GOOD PRACTICES
    • TOOLBOX
  • ANALYSIS
    • AFTER DEATH
    • FORENSICS
  • CYBER ALERTS
  • CYBER-TV
  • SCHEDULE

Main navigation

  • Home
  • CYBER-ACTU
  • CYBER
  • GOOD PRACTICES
    • CYBER GOOD PRACTICES
    • TOOLBOX
  • ANALYSIS
  • CYBER ALERTS
  • CYBER-TV
  • SCHEDULE

SOME OPEN SOURCE SECURITY TOOLS

Firewall

  • Netfilter
  • Guard dog
  • Firewall Builder
  • Quicktables


Rootkit revealer

  • Chkrootkit for Linux
  • Rootkit Revealer for Windows
  • Rootkit Hunter for Mac OS


Network Security Assessment Tools

  • NMap Security Scanner
  • Nessus

Application Security Vulnerability Assessment Tools

  • Nikto Web Server Security Vulnerability Scanner
  • Wikto Web Server Security Vulnerability Scanner
  • Samurai Web Testing Framework


Process analysis

  • Process Utilities (SysInternals)
  • McAfee Vision
  • CurrProcess (NirSoft)

Registry analysis

  • Process Monitor (Sysinternals)
  • RegShot
  • RegSnap

System scan (registry, file scanner)

  • HijackThis (Win32)

Data Backup and Restore Tools

  • Areca Backup (Win32/Linux)
  • SuperDuper (Mac OS X)


Data synchronization tools

  • JFileSync (Win32/Linux/Mac OS X)
  • Unison (Win32/Linux)
  • SyncBack (Win32)
  • SyncTwoFolders (Mac OS X)


Data encryption tools

  • BitLocker (Win32)
  • VeraCrypt (Win32/Linux/Mac OS X)


Data recovery tools

  • dcfldd (Linux)
  • EaseUS (Free/Trial for Win and Mac)
  • Rescue World (Linux)
  • PC Inspector File Recovery (Win32)
  • R-Studio for Linux (Linux)
  • Undelete Plus (Win32)


Permanent data deletion tools

  • Darik's Boot and Nuke (Win32/Linux)
  • Eraser (Win32)
  • Microsoft Sysinternal SDelete (Win32)
  • Wipe (Linux)

 
Outils WhoIs / DNS Lookup / Traceroute / IP address

  • Central Ops.net (IP and domain whois lookup, traceroute)
  • HKDNR (domain whois lookup for .hk)
  • NetworkSolutions (IP and domain whois lookup)
  • Squish DNS Check (domain whois lookup)
  • IP Address Calculator
  • IP to ASN Whois
     
Home

Africa CyberSecurity Mag is a specialized magazine on Cybersecurity, CyberDefence, CyberJurisdiction and Digital Protection published by the company CyberSpector . The magazine focuses on CyberSecurity news in Africa and around the world and organizes several specific activities (conferences, webinars, study and reflection days).

Email : contact@cybersecuritymag.africa

Africa Cyber News

South Africa
Algeria
Angola
Botswana
Burkina Faso
Burundi
Benign
Cameroon
Cape Verde
Central African Republic
Comoros
Ivory coast
Djibouti
Eswatini
Egypt
Eritrea
Ethiopia
Gabon
Gambia
Ghana
Guinea
Guinea-Bissau
Equatorial Guinea
Kenya
Lesotho
Liberia
Libya
Madagascar
Malawi
Mali

 

Morocco
Mauritius
Mauritania
Mozambique
Namibia
Niger
Nigeria
Uganda
Rwanda
RD Congo
Rep. Congo
Seychelles
Sierra Leone
Somalia
Sudan
South sudan
Senegal
Saint Thomas
Tanzania
Chad
Togo
Tunisia
Zambia
Zimbabwe

 

 

Tous droits réservés Africa Cybersecurity Mag by CyberSpector - 2023

Footer

  • Confidentiality
  • CGU
  • Cookies
  • Legal Notice
  • Newsletters
  • Sitemap
  • RSS
  • About
  • Contact