exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 444 RSS Feed

Files

DNSChef 0.2.1
Posted Jan 21, 2013
Authored by Peter Kacherginsky | Site thesprawl.org

DNSChef is a highly configurable DNS proxy for Penetration Testers and Malware Analysts. A DNS proxy (aka "Fake DNS") is a tool used for application network traffic analysis among other uses. For example, a DNS proxy can be used to fake requests for "badguy.com" to point to a local machine for termination or interception instead of a real host somewhere on the Internet.

Changes: Fixed a compatibility bug with older Python 2.6 interpreters.
tags | local
systems | unix
SHA-256 | b6991534723c3d26ea8eda3600cfcd6cb8e2a107384744e001a49da46c3db92f
DNSChef 0.2
Posted Jan 20, 2013
Authored by Peter Kacherginsky | Site thesprawl.org

DNSChef is a highly configurable DNS proxy for Penetration Testers and Malware Analysts. A DNS proxy (aka "Fake DNS") is a tool used for application network traffic analysis among other uses. For example, a DNS proxy can be used to fake requests for "badguy.com" to point to a local machine for termination or interception instead of a real host somewhere on the Internet.

Changes: Added IPv6 support. Added AAAA, MX, CNAME, NS, SOA and NAPTR support. Added support for ANY queries (returns all known fake records). Various other additions and changes.
tags | tool, local
systems | unix
SHA-256 | 9461b630b520be8b9e28b4d80ff50dc974a91014b3e3fdfb0019340b47a43306
CVE Checker 3.2
Posted Nov 26, 2012
Authored by Sven Vermeulen | Site cvechecker.sourceforge.net

cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database. This is not a bullet-proof method and you will most likely have many false positives, but it is still better than nothing, especially if you are running a distribution with little security coverage.

Changes: Reports CVSS scoring when a CVE is potentially applicable to the system. Also fixes some buffer handling code and adds in checks for missing runtime dependencies in the scripts.
tags | tool, vulnerability
systems | unix
SHA-256 | d054766533535bda5c86d8650a423042fb8de3363a77ff9ebc18531177104f66
DNSChef 0.1
Posted Feb 22, 2012
Authored by Peter Kacherginsky | Site thesprawl.org

DNSChef is a highly configurable DNS proxy for Penetration Testers and Malware Analysts. A DNS proxy (aka "Fake DNS") is a tool used for application network traffic analysis among other uses. For example, a DNS proxy can be used to fake requests for "badguy.com" to point to a local machine for termination or interception instead of a real host somewhere on the Internet.

tags | local
systems | unix
SHA-256 | 855bcceb07688d98414efd3e963cb6ddd7ed293ef28ec31ac1b5a96d5409d7a9
Pytroj Tool Python Injector
Posted Sep 28, 2011
Authored by Itzik Kotler, Joey Geralnik, Leon Fedotov

Pytroj is a tool for infecting .pyc files with arbitrary code that spreads out to infect all other .pyc files. Pytroj is a proof of concept attack against .pyc files. It searches for other .pyc files and injects itself into them. The injected code can be any python code (in this case it prints "You have been exploited").

tags | arbitrary, proof of concept, python
systems | unix
SHA-256 | d44ca1c93ee2388f67a815c8034747a43a8ba7d4a3399ef8aea6d9162f241d59
DNS Discovery Sub-Domain Brute-Forcer
Posted Sep 21, 2011
Authored by m0nad

DNS Discovery is a multi-threaded DNS sub-domain brute-forcing utility. It is meant to be used by pen-testers during initial stages.

tags | tool
systems | unix
SHA-256 | 5bf08252244ab6cde4e1c710d2b50aefc135909e3bc1a1b9fcaf37e4711286c1
CVE Checker 3.1
Posted Apr 14, 2011
Authored by Sven Vermeulen | Site cvechecker.sourceforge.net

cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database. This is not a bullet-proof method and you will most likely have many false positives, but it is still better than nothing, especially if you are running a distribution with little security coverage.

Changes: This bugfix release sanitizes the user defined key before it is put in the database and fixes a runtime problem when both SQLite and MySQL support are requested.
tags | vulnerability
systems | unix
SHA-256 | a7bed8adf2ecf6e23ed3f5339c1e7c15686d07059931a0cf2de3c60290e434f8
CVE Checker 3.0
Posted Apr 12, 2011
Authored by Sven Vermeulen | Site cvechecker.sourceforge.net

cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database. This is not a bullet-proof method and you will most likely have many false positives, but it is still better than nothing, especially if you are running a distribution with little security coverage.

Changes: MySQL is now supported. Watchlists have been added.
tags | vulnerability
systems | unix
SHA-256 | f23e5fc08f41cbc184e4b817960bba907308330aa9d1192f6a4b26468a43b2e2
Sec-Wall Security Proxy 1.0.0
Posted Apr 10, 2011
Authored by Dariusz Suchojad | Site sec-wall.gefira.pl

sec-wall is a high-performance security proxy that supports SSL/TLS, WS-Security, HTTP Auth Basic/Digest, extensible authentication schemes based on custom HTTP headers and XPath expressions, powerful URL matching/rewriting, and an optional header enrichment. It's a security wall with which you can conveniently fence otherwise defenseless backend servers.

Changes: This initial release includes support for SSL/TLS, WS-Security, HTTP Auth Basic/Digest, extensible authentication schemes based on custom HTTP headers and XPath expressions, powerful URL matching and rewriting, and optional header enrichment. All of these features are very well tested and properly documented.
tags | web
systems | unix
SHA-256 | 0297ae5a5ab72b01968fb6f36953dc782b1dc5fc91df7729923b47036aaad7da
CVE Checker 2.0
Posted Dec 2, 2010
Authored by Sven Vermeulen | Site cvechecker.sourceforge.net

cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database. This is not a bullet-proof method and you will most likely have many false positives, but it is still better than nothing, especially if you are running a distribution with little security coverage.

Changes: This release includes the ability to scan changed/added files rather than the entire system, a command that helps to generate version matching rules, and a new switch to report vulnerabilities of software versions that are higher than the software versions you have on your system.
tags | vulnerability
systems | unix
SHA-256 | a9d99bafa0ee674ed7db0f39913ac69a7db68c61feadf6f6fb301580e83da1cb
CVE Checker 1.0
Posted Oct 4, 2010
Authored by Sven Vermeulen | Site cvechecker.sourceforge.net

cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database. This is not a bullet-proof method and you will most likely have many false positives, but it is still better than nothing, especially if you are running a distribution with little security coverage.

Changes: A few small error handling and buffer overflow problems were fixed.
tags | vulnerability
systems | unix
SHA-256 | 8b60bf1563a79d28075dea944f0f49a13fda7ca7de44d91631356eb2a2433378
CVE Checker 0.6
Posted Sep 11, 2010
Authored by Sven Vermeulen | Site cvechecker.sourceforge.net

cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database. This is not a bullet-proof method and you will most likely have many false positives, but it is still better than nothing, especially if you are running a distribution with little security coverage.

Changes: Reporting performance was improved tremendously for recent SQLite libraries. Reporting on found software, regardless of it matching a CVE entry, was added, and quite a few bugs were fixed.
tags | vulnerability
systems | unix
SHA-256 | 818a0fa17c65124e82df8e30ae5679aee65d7f9646353fdb97f393b14c2a6bd1
CVE Checker 0.5
Posted Sep 3, 2010
Authored by Sven Vermeulen | Site cvechecker.sourceforge.net

cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database. This is not a bullet-proof method and you will most likely have many false positives, but it is still better than nothing, especially if you are running a distribution with little security coverage.

Changes: The tool should now build properly on NetBSD and FreeBSD (although more user experience here is still welcome). This release introduces a cvereport command (example output can be found at the project site), and has lowered its initial dependency requirements. pullcves now only loads the CVE XML changes in the database, rather than iterating across all CVE XML entries.
tags | vulnerability
systems | unix
SHA-256 | b4b0316c61f87022c046f8558b8fe514d770dd2e605866b1a794a6a10d890f0b
CVE Checker 0.4
Posted Aug 26, 2010
Authored by Sven Vermeulen | Site cvechecker.sourceforge.net

cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database. This is not a bullet-proof method and you will most likely have many false positives, but it is still better than nothing, especially if you are running a distribution with little security coverage.

Changes: This release includes internal project files reorganization (more to the liking of the GNU autoconf/automake standards), fixes a database leak bug, and introduces a slightly more intelligent pullcves command (with multiple return code behavior to improve automation efforts). All documentation has been updated, and a pullcves manual page has been added.
tags | vulnerability
systems | unix
SHA-256 | 5d43fb948d296ce79943d6b84634a90f68d6a566816163a8756bd4f272f9b566
CVE Checker 0.3
Posted Aug 21, 2010
Authored by Sven Vermeulen | Site cvechecker.sourceforge.net

cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database. This is not a bullet-proof method and you will most likely have many false positives, but it is still better than nothing, especially if you are running a distribution with little security coverage.

Changes: Cleanups in the CSV output have been made, and a few sample reporting files have been added. This release fixes a few bugs in file matching support and adds --no-check-certificates to the wget command.
tags | vulnerability
systems | unix
SHA-256 | 3c8bf7f22f9ffe6e657b5b30a7762ca7f8074d0b2bf638ab221cb7d4c008b7ce
Peludo Compilation Environment 1.0.0
Posted Aug 20, 2010
Authored by Claudio Castiglia | Site peludo.org

Peludo is a system to create and run platform independent, self-contained, network-transportable, injectable applications written in the C programming language. It provides a cross-compilation environment and other tools needed to generate applications using a new binary format called PLD as well as a Runtime to launch these applications.

systems | unix
SHA-256 | b869ca164151ce9979f44282377f2972a1638476316a119c75db4837c603a3c7
CVE Checker 0.2
Posted Aug 17, 2010
Authored by Sven Vermeulen | Site cvechecker.sourceforge.net

cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database. This is not a bullet-proof method and you will most likely have many false positives, but it is still better than nothing, especially if you are running a distribution with little security coverage.

Changes: This release fixes ./configure to fail when sqlite3 or libconfig isn\'t present. It fixes make to support make install. It fixes compiler warnings on size_t usage.
tags | vulnerability
systems | unix
SHA-256 | 09efa8d4050dc9fe1d0ed218d95860ef5154db8b3a4fdf5ea39991d42c2da7cf
TMAC For Linux 1.0-Beta
Posted Jun 9, 2010
Authored by Sagar Belure | Site sagar.belure.com

TMAC is a simple bash program for randomly changing the MAC address of a Network Interface Card (NIC) on Linux .

tags | bash
systems | linux, unix
SHA-256 | 4f6a66e27eed698a39d4a2960997b14b9c4eacfb20c36f5e8bd98b842239e67e
Gmail Checker Script
Posted Jun 8, 2010
Authored by gunslinger | Site gunslingerc0de.wordpress.com

This is a simple Gmail account checker.

systems | unix
SHA-256 | de9fd56594a985798b628c8648e2ffb5e2d258d6031c2e6ab05c4609883107d9
Oracle PL/SQL Unwrapper
Posted Apr 10, 2010
Authored by Niels Teusink | Site blog.teusink.net

This tool decodes wrapped (obfuscated) Oracle PL/SQL packages. Supports Oracle 10g and 11g.

systems | unix
SHA-256 | 04976acaa5e604a5f7210531fcbf4b8284d9b51bb5023c5208596d721c55e492
Pwanat NAT To NAT Tool 0.2
Posted Apr 6, 2010
Authored by Samy | Site samy.pl

pwnat, pronounced "poe-nat", is a tool that allows any number of clients behind NATs to communicate with a server behind a separate NAT with no port forwarding and no DMZ setup on any routers in order to directly communicate with each other. The server does not need to know anything about the clients trying to connect.

systems | unix
SHA-256 | 709e1288e05bcae5f1221f2904de2ef64b9d8b81d5fbee6c3b69ef49a807aa1f
PerJack TCP Session Hijack Tool
Posted Mar 2, 2010
Authored by Cheese

PerJack is a TCP Session Hijack tool written in Perl. It does a man-in-the-middle attack, displays all active sessions and takes over the selected TCP session.

tags | perl, tcp
systems | unix
SHA-256 | e2e68476aa61718b4e37e0922eab23c2c45bfff1a84ab91467ab47ea7a3576f0
Peludo Compilation Environment Beta 1.0.0
Posted Dec 30, 2009
Authored by Claudio Castiglia | Site netifera.com

Peludo is a system to create and run platform independent, self-contained and injectable applications written in the C programming language. It provides a cross compiling environment with the tools to generate applications in Peludo's new binary format (PLD). The system also provides the runtime to launch these programs as independent executable files or as position independent code that can be injected into a running process. Peludo makes the Java virtual machine of the netifera probe injectable and easier to port to new platforms.

tags | java
systems | unix
SHA-256 | 5c93ab65308e02e7780af3686d07cac821eb97c26bb98eed438de8600584e0da
Iodine IPv4 DNS Tunneler
Posted Jun 3, 2009
Authored by Yarrick | Site code.kryo.se

iodine is a piece of software that lets you tunnel IPv4 data through a DNS server. This can be useful in situations where Internet access is firewalled, but DNS queries are allowed. It needs a TUN/TAP device to operate. The bandwidth is asymmetrical with limited upstream and up to 1 Mbit/s downstream.

Changes: A segmentation fault was fixed for Mac OS X and FreeBSD.
systems | unix
SHA-256 | cbc14665d325634318ebd6f792f8dc2229101bd5a55232420570538612f6a5e4
Advchk Advisory Checking Tool
Posted May 29, 2009
Authored by Stephan Schmieder | Site advchk.unixgu.ru

Advchk (Advisory Check) reads security advisories so you do not have to. Advchk gathers security advisories using RSS feeds, compares them to a list of known services, and alerts you if you are vulnerable. Since adding hosts and services by hand would be quite a boring task, advchk leverages nmap for automatic service and version discovery.

Changes: Windows hosts can now be monitored remotely by using the MS-RPC protocol. INSTALL and install.sh files have been added.
systems | unix
SHA-256 | 996ccecf32af011b6f124af930c0277523a6a9a3d7da3cc3b2395019ff878867
Page 2 of 18
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Google Patches Critical Chrome Vulnerability
Posted Apr 24, 2024

tags | headline, flaw, google, patch, chrome
Hackers Are Using Developing Countries For Ransomware Practice
Posted Apr 24, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
Authorities Investigate LabHost Users After Phishing Service Shutdown
Posted Apr 23, 2024

tags | headline, cybercrime, fraud, phish
Windows Vulnerability Reported By The NSA Exploited To Install Russian Malware
Posted Apr 23, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar, spyware, nsa
UnitedHealth Admits Breach Could Cover Substantial Proportion Of People In America
Posted Apr 23, 2024

tags | headline, hacker, privacy, data loss
Microsoft DRM Hack Could Allow Movie Downloads From Streaming
Posted Apr 23, 2024

tags | headline, microsoft, flaw, pirate
Over A Million Neighbourhood Watch Members Exposed
Posted Apr 23, 2024

tags | headline, privacy, britain, data loss
MITRE Hacked By State Sponsored Group Via Ivanti Zero Days
Posted Apr 23, 2024

tags | headline, hacker, government
Russia's Sandworm APT Linked To Attack On Texas Water Plant
Posted Apr 18, 2024

tags | headline, malware, usa, russia, cyberwar, scada
EU Tells Meta It Can't Paywall Privacy
Posted Apr 18, 2024

tags | headline, government, privacy, facebook, social
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close