Sapsi está especializada en la gestión de información digital , la ejecución de investigaciones destinadas a la obtención de pruebas electrónicas y al descubrimiento de brechas de seguridad.


Auditorias

La Ciberseguridad de su empresa debe empezar por la evaluación del nivel de seguridad de la misma.

Análisis Forenses

Sapsi está especializada en la gestión de información digital y la ejecución de investigaciones destinadas a la obtención de pruebas electrónicas.

Seguridad preventiva

Los servicios prestados por Sapsi están diseñados para ofrecer soluciones preventivas y afrontar una amplia gama de conflictos: fraude, uso no autorizado de dispositivos..

Latest News On Sapsi Security Services

Reaver – Attack against Wi-Fi Protected Setup (WPS)

Reaver - Attack against Wi-Fi Protected Setup (WPS) Reaver has been designed to be a robust and practical attack against Wi-Fi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases. It has been tested against a wide variety of access points and WPS implementations.The original Reaver implements a online brute force attack against,

LaZagne v2.2 – Credentials Recovery Project

LaZagne v2.2 - Credentials Recovery Project The LaZagne project is an open source application used to retrieve lots of passwords stored on a local computer. Each software stores its passwords using different techniques (plaintext, APIs, custom algorithms, databases, etc.). This tool has been developed for the purpose of finding these passwords for the most commonly-used

Yuki Chan – Automate Pentest Tool

Yuki Chan - Automate Pentest Tool The Yuki Chan is an Automated Penetration Testing tool this tool will auditing all standard security test method for you.WARNINGI highly recommend using this tool by using Kali Linux OS By using this tool it means you agree with terms, conditions, and risksBy using this tool you agree thatuse

OWASP ZSC – Shellcode/Obfuscate Code Generator

OWASP ZSC - Shellcode/Obfuscate Code Generator OWASP ZSC is an open source software in Python language which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX under Python.Usage of shellcodesShellcodes are small codes in Assembly language which could be used as the payload in

Mr.SIP – SIP-Based Audit and Attack Tool

Mr.SIP - SIP-Based Audit and Attack Tool Mr.SIP is a tool developed to audit and simulate SIP-based attacks. Originally it was developed to be used in academic work to help developing novel SIP-based DDoS attacks and defense approaches and then as an idea to convert it to a fully functional SIP-based penetration testing tool, it

Crowbar – Brute Forcing Tool (SSH, OpenVPN, RDP, VNC)

Crowbar - Brute Forcing Tool (SSH, OpenVPN, RDP, VNC) Crowbar (formally known as Levye) is a brute forcing tool that can be used during penetration tests. It was developed to brute force some protocols in a different manner according to other popular brute forcing tools. As an example, while most brute forcing tools use username