DNSChef is a highly configurable DNS proxy for Penetration Testers and Malware Analysts. A DNS proxy (aka "Fake DNS") is a tool used for application network traffic analysis among other uses. For example, a DNS proxy can be used to fake requests for "badguy.com" to point to a local machine for termination or interception instead of a real host somewhere on the Internet.
b6991534723c3d26ea8eda3600cfcd6cb8e2a107384744e001a49da46c3db92f
DNSChef is a highly configurable DNS proxy for Penetration Testers and Malware Analysts. A DNS proxy (aka "Fake DNS") is a tool used for application network traffic analysis among other uses. For example, a DNS proxy can be used to fake requests for "badguy.com" to point to a local machine for termination or interception instead of a real host somewhere on the Internet.
9461b630b520be8b9e28b4d80ff50dc974a91014b3e3fdfb0019340b47a43306
cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database. This is not a bullet-proof method and you will most likely have many false positives, but it is still better than nothing, especially if you are running a distribution with little security coverage.
d054766533535bda5c86d8650a423042fb8de3363a77ff9ebc18531177104f66
DNSChef is a highly configurable DNS proxy for Penetration Testers and Malware Analysts. A DNS proxy (aka "Fake DNS") is a tool used for application network traffic analysis among other uses. For example, a DNS proxy can be used to fake requests for "badguy.com" to point to a local machine for termination or interception instead of a real host somewhere on the Internet.
855bcceb07688d98414efd3e963cb6ddd7ed293ef28ec31ac1b5a96d5409d7a9
Pytroj is a tool for infecting .pyc files with arbitrary code that spreads out to infect all other .pyc files. Pytroj is a proof of concept attack against .pyc files. It searches for other .pyc files and injects itself into them. The injected code can be any python code (in this case it prints "You have been exploited").
d44ca1c93ee2388f67a815c8034747a43a8ba7d4a3399ef8aea6d9162f241d59
DNS Discovery is a multi-threaded DNS sub-domain brute-forcing utility. It is meant to be used by pen-testers during initial stages.
5bf08252244ab6cde4e1c710d2b50aefc135909e3bc1a1b9fcaf37e4711286c1
cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database. This is not a bullet-proof method and you will most likely have many false positives, but it is still better than nothing, especially if you are running a distribution with little security coverage.
a7bed8adf2ecf6e23ed3f5339c1e7c15686d07059931a0cf2de3c60290e434f8
cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database. This is not a bullet-proof method and you will most likely have many false positives, but it is still better than nothing, especially if you are running a distribution with little security coverage.
f23e5fc08f41cbc184e4b817960bba907308330aa9d1192f6a4b26468a43b2e2
sec-wall is a high-performance security proxy that supports SSL/TLS, WS-Security, HTTP Auth Basic/Digest, extensible authentication schemes based on custom HTTP headers and XPath expressions, powerful URL matching/rewriting, and an optional header enrichment. It's a security wall with which you can conveniently fence otherwise defenseless backend servers.
0297ae5a5ab72b01968fb6f36953dc782b1dc5fc91df7729923b47036aaad7da
cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database. This is not a bullet-proof method and you will most likely have many false positives, but it is still better than nothing, especially if you are running a distribution with little security coverage.
a9d99bafa0ee674ed7db0f39913ac69a7db68c61feadf6f6fb301580e83da1cb
cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database. This is not a bullet-proof method and you will most likely have many false positives, but it is still better than nothing, especially if you are running a distribution with little security coverage.
8b60bf1563a79d28075dea944f0f49a13fda7ca7de44d91631356eb2a2433378
cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database. This is not a bullet-proof method and you will most likely have many false positives, but it is still better than nothing, especially if you are running a distribution with little security coverage.
818a0fa17c65124e82df8e30ae5679aee65d7f9646353fdb97f393b14c2a6bd1
cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database. This is not a bullet-proof method and you will most likely have many false positives, but it is still better than nothing, especially if you are running a distribution with little security coverage.
b4b0316c61f87022c046f8558b8fe514d770dd2e605866b1a794a6a10d890f0b
cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database. This is not a bullet-proof method and you will most likely have many false positives, but it is still better than nothing, especially if you are running a distribution with little security coverage.
5d43fb948d296ce79943d6b84634a90f68d6a566816163a8756bd4f272f9b566
cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database. This is not a bullet-proof method and you will most likely have many false positives, but it is still better than nothing, especially if you are running a distribution with little security coverage.
3c8bf7f22f9ffe6e657b5b30a7762ca7f8074d0b2bf638ab221cb7d4c008b7ce
Peludo is a system to create and run platform independent, self-contained, network-transportable, injectable applications written in the C programming language. It provides a cross-compilation environment and other tools needed to generate applications using a new binary format called PLD as well as a Runtime to launch these applications.
b869ca164151ce9979f44282377f2972a1638476316a119c75db4837c603a3c7
cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database. This is not a bullet-proof method and you will most likely have many false positives, but it is still better than nothing, especially if you are running a distribution with little security coverage.
09efa8d4050dc9fe1d0ed218d95860ef5154db8b3a4fdf5ea39991d42c2da7cf
TMAC is a simple bash program for randomly changing the MAC address of a Network Interface Card (NIC) on Linux .
4f6a66e27eed698a39d4a2960997b14b9c4eacfb20c36f5e8bd98b842239e67e
This is a simple Gmail account checker.
de9fd56594a985798b628c8648e2ffb5e2d258d6031c2e6ab05c4609883107d9
This tool decodes wrapped (obfuscated) Oracle PL/SQL packages. Supports Oracle 10g and 11g.
04976acaa5e604a5f7210531fcbf4b8284d9b51bb5023c5208596d721c55e492
pwnat, pronounced "poe-nat", is a tool that allows any number of clients behind NATs to communicate with a server behind a separate NAT with no port forwarding and no DMZ setup on any routers in order to directly communicate with each other. The server does not need to know anything about the clients trying to connect.
709e1288e05bcae5f1221f2904de2ef64b9d8b81d5fbee6c3b69ef49a807aa1f
PerJack is a TCP Session Hijack tool written in Perl. It does a man-in-the-middle attack, displays all active sessions and takes over the selected TCP session.
e2e68476aa61718b4e37e0922eab23c2c45bfff1a84ab91467ab47ea7a3576f0
Peludo is a system to create and run platform independent, self-contained and injectable applications written in the C programming language. It provides a cross compiling environment with the tools to generate applications in Peludo's new binary format (PLD). The system also provides the runtime to launch these programs as independent executable files or as position independent code that can be injected into a running process. Peludo makes the Java virtual machine of the netifera probe injectable and easier to port to new platforms.
5c93ab65308e02e7780af3686d07cac821eb97c26bb98eed438de8600584e0da
iodine is a piece of software that lets you tunnel IPv4 data through a DNS server. This can be useful in situations where Internet access is firewalled, but DNS queries are allowed. It needs a TUN/TAP device to operate. The bandwidth is asymmetrical with limited upstream and up to 1 Mbit/s downstream.
cbc14665d325634318ebd6f792f8dc2229101bd5a55232420570538612f6a5e4
Advchk (Advisory Check) reads security advisories so you do not have to. Advchk gathers security advisories using RSS feeds, compares them to a list of known services, and alerts you if you are vulnerable. Since adding hosts and services by hand would be quite a boring task, advchk leverages nmap for automatic service and version discovery.
996ccecf32af011b6f124af930c0277523a6a9a3d7da3cc3b2395019ff878867