Unhide is a forensic tool to find hidden processes and TCP/UDP ports that are hidden via rootkits, LKMs, or other techniques.
631bc2fb09fa05351273021fd32483e5bf4187dcdc15222335fe2ddc5d146ae3
Chkrootkit checks locally for signs of a rootkit. Chkrootkit includes ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions, strings.c for quick and dirty strings replacement, check_wtmpx.c to check for wtmpx deletions and the files chkproc.c and chkdirs.c to check for LKM trojans. Tested on Linux 2.0.x, 2.2.x and 2.4.x, FreeBSD 2.2.x, 3.x, 4.x, and 5.x, BSDI, OpenBSD 2.6, 2.7, 2.8, 2.9, 3.0 and 3.1, NetBSD 1.5.2 and Solaris 2.5.1, 2.6 and 8.0, and HP-UX 11.
b4b3d3540a7022aa7a81cae93f28c8475bc2660a21f88126725624c09769f1fb
sqlmap is an automatic blind SQL injection tool, developed in python, capable to perform an active database management system fingerprint, enumerate entire remote databases and much more. The aim of this project is to implement a fully functional database management system tool which takes advantages of web application programming security flaws which lead to SQL injection vulnerabilities.
4c1c491de3c1ba151bbb4e0d7c5b72b4445beca08eab802281cc7bcc7be7555e
Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.
a46610fc761e61f4f85750693f6e17aafa3a47e24e8cef76401f67d25e94d186
sqlmap is an automatic blind SQL injection tool, developed in python, capable to perform an active database management system fingerprint, enumerate entire remote databases and much more. The aim of this project is to implement a fully functional database management system tool which takes advantages of web application programming security flaws which lead to SQL injection vulnerabilities.
79a390525330bfc0ba75ff322b46363ad822b19c9fe144aaa840869108e5a04a
sqlmap is an automatic blind SQL injection tool capable of enumerating entire remote databases, performing an active database fingerprint and much more. The aim of this project is to implement a fully functional database mapper tool which takes advantages of web application security flaws.
e120df541896d4a34c341dc9469b132340791558f489364d3953cfeeeaa5b7cb
sqlmap is an automatic blind SQL injection tool capable of enumerating entire remote databases, performing an active database fingerprint and much more. The aim of this project is to implement a fully functional database mapper tool which takes advantages of web application security flaws.
0853916caa03e6bd3a882a8a311e991ff641b37315415096cb6755d48f8b090d
Pandora is a monitoring system designed to watch systems and applications. It allows auditing of any element of a system, from a network interface being down to a defacement in a web site. Included in this tarball are PandoraFMS_Agent_UNIX-1.2.0.tar.gz, PandoraFMS_Agent_Windows_src-1.2.0.zip, PandoraFMS_Console-1.2.0.tar.gz, PandoraFMS_Documentation-1.2.0.zip, PandoraFMS_Server-1.2.0.tar.gz, and PandoraFMS_Windows_Agent_Setup-1.2-0.exe. These files make up the server, web console, and various agents to be used in the PandoraFMS.
dd690d510b277c38e2493ebedc80eb6bb78639a11af4a83db4ba863f16782723
PIRANA is an exploitation framework that tests the security of a email content filter. By means of a vulnerability database, the content filter to be tested will be bombarded by various emails containing a malicious payload intended to compromise the computing platform. PIRANA's goal is to test whether or not any vulnerability exists on the content filtering platform.
4f4bf22a3446dcede66d3f4fc60bfd1cdac5e6fd174c4f6f682bbdf405cdca09
Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated twice a month to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins, open shares, and much more.
32b4dec44d7ac00e4544cc45eed115e9a99c7513e9e2bc2d0e1083373a2bb97a
sshtime v0.1 is a simple OpenSSH timing attack tool based on expect meant to remotely analyze timing differences in sshd "Permission denied" replies. Depending on OpenSSH version and configuration, it may lead to disclosure of valid usernames.
b57569d93458fb3032f8c9681c5bf741fcd8ec30007b182512af76f3c1f46e56
Huk is a tool aimed to test password fragility using the brute-force method, multi-threaded and completely modular. The main difference for other tools is that Huk modules are compiled as "shared objects", what make it easy do develop and deploy new modules.
5fbddf2f3507d5e5c025652cd792ec1db42652af4e8408e8084b33dae818d648
Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.
64d21cef13574338f49015127d369e1f02515fe4eb81cbda716d885ff4cd1278
Simple MySQL brute forcing program written in C that uses an external user and password list.
947a89b03512033a3418df20aa8295c4288d94c88b8991cd487561a3ba57a0b2
rhj will let you exploit the ptrace() syscall to monitor and hijack some syscalls run-time. At the moment few syscalls are supported (i.e. send(), recv(), read(), write()) since the program is still a proof of concept.
78500617a093757ebda076945a9af0c3247aa61eb535d942a83eb186890be48a
lbd (load balancing detector) is a bash shell script which detects if a given domain uses DNS and/or HTTP load balancing.
57d0ad636cf10837955fd50d728e114ce9917eb41bb2e36ebe19359136b200bd
clfuzz is a command line argument fuzzer written in Python. It is very useful for auditing setuid binaries for command line overflows.
574e98fdf313a192edc3b21ee06943e44bcb1c39c9325d66467fde982361b938
A perl script that automates the process of guessing MySQL tables through SQL injection by first determining the number of arguments in the SELECT statement and then brute forcing table names from a word list.
fdd14b591b7c68ba2d74637bacb8793812b3b32f62eef68d828062124764aa02
TFTP-bruteforcer is a fast TFTP filename bruteforcer written in perl.
2af969e3ce63a74869227e49056fa595115bfee36f4d4b0b86b4006dd1feceb5
PIRANA is an exploitation framework that tests the security of a email content filter. By means of a vulnerability database, the content filter to be tested will be bombarded by various emails containing a malicious payload intended to compromise the computing platform. PIRANA's goal is to test whether or not any vulnerability exists on the content filtering platform.
3657e8c9cb39fe8805ada794f7b9e5b5c772a6b208998810e38934e7268cc63d
Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.
7a8c364fe1653c8f9d64054d07d2272ea239a5225ce2044024d79467df873c18
Adaptive http-sql bruteforce tool version 2 for MySQL injection bruteforcing.
bfe9a74db18539147ae91a85333818250a82efc1d34813964f7d248368bca86b
Proof of concept tool to be used for blind SQL injection attacks.
ebf4d302ae4b06b46a2148a9f11a7328bd227131540f73c5437a387f1fe5d612
System Local Audit Daemon can run standalone or managed by systems like IBM-Tivoli, HP-OpenView, or Nessus to perform local security checks. It runs on the target hosts and enables them to call security tools like John the Ripper, Tiger, Tripwire, or a virus scanner via a unified XML interface. It is part of the BOSS Project.
49144aaa097f8d0f0c2697e4989e92d751c5a10db6c89eff5cf883382c58ab22
Unhide is a forensic tool to find hidden processes and TCP/UDP ports that are hidden via rootkits, LKMs, or other techniques.
9f361443fb38bcb9290300497b9ca8d9dc485b8c163bf104169fa756f4a323b9