image1
image2
image3

r00tk1t

<Unm4$k1ng Vuln3r4b1l1+y>

$/-/@$/-/@/\/|< Blogs

Our Expertise

image4

Vulnerability Assessment

  •  Web & Mobile Applications.
  • Operating Systems (Windows, Linux, Unix, Cisco IOS)
  • Network devices (Routers, Firewalls, Switches, VoIP, Internet of Things)

image5

Penetration Testing

PT services in following areas: 

  • Web Application Penetration Testing.
  • Mobile Application Penetration Testing.

We developed recon-tools

image6

PINAKA

Automated Port Scanner which scans a machine to provide output in a raw data format in a excel sheet or a notepad.

image7

VAJRA

This tool is based on OSINT Framework, It tracks down the vulnerabilities of a machine exposed to internet to ease down enumeration,

This tool is mostly used by security researchers and testers for digital footprinting.

image8

YALI

Yali tool is developed to find out IP addresses of multiple hostnames or FQDN's in a single shot. This reduces the manual work of fetching IP address through nslookup queries.

Contact Us

r00tk1t

New Delhi

Email : rootkit.io@protonmail.com

Hours

Monday - Friday: 9am - 5pm

Saturday - Sunday: Closed

Get a Quote

Cancel

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.