Advchk (Advisory Check) reads security advisories so you do not have to. Advchk gathers security advisories using RSS feeds, compares them to a list of known services, and alerts you if you are vulnerable. Since adding hosts and services by hand would be quite a boring task, advchk leverages nmap for automatic service and version discovery.
3b0a45e1c28c4ec7e8daa6104c43b6514e974cc5cb2f3f15b1871c741e8ce724
Stone is an application layer TCP/IP packet repeater. It repeats TCP and UDP packets from the inside of a firewall to the outside or vice versa. It is simple, supports OpenSSL for encrypting and decrypting packets, performing client and server verifications, and sending a substring of the subject of the certificate to the destination, can operate as an HTTP proxy, and performs POP to APOP conversion. It also supports IPv6 and can convert between IPv4 and IPv6 each other.
2ef3f63f1ccdb86f00251ca40cb3f99fefa1cbe21858fbc3af92b5c2b0d8ef3f
Advchk (Advisory Check) reads security advisories so you do not have to. Advchk gathers security advisories using RSS feeds, compares them to a list of known services, and alerts you if you are vulnerable. Since adding hosts and services by hand would be quite a boring task, advchk leverages nmap for automatic service and version discovery.
e35d5c1dc1a555251834e05e78af310b90c1f406a65c401623c817549bef03ce
RFDump is a tool to detect RFID-Tags and show their meta information: Tag ID, Tag Type, manufacturer etc. The user data memory of a tag can be displayed and modified using either a Hex or an ASCII editor. Tag contents can be stored and loaded using a specific XML format. This effectively allows the copy of data from one tag to another. In addition, the integrated cookie feature demonstrates how easy it is for a company to abuse RFID technology to spy on their customers. RFDump works with the ACG Multi-Tag Reader or similar card reader hardware. The tags that are supported for reading, writing, and editing are ISO 15693, ISO 14443 A, ISO 14443 B, SR176(1,2), Tag-it®, and I-Code®.
7498a996213ebdc50a5e8e3265ec4080704960ac9f7d16d6ddabc4aaf0850dcd
iodine is a piece of software that lets you tunnel IPv4 data through a DNS server. This can be useful in situations where Internet access is firewalled, but DNS queries are allowed. It needs a TUN/TAP device to operate. The bandwidth is asymmetrical with limited upstream and up to 1 Mbit/s downstream.
56ad5cc2710bd119ec123934078b222b03d7c3bbf0fc025077bfcb350cdc92ab
Wesley is a fake DHCP server that implements various features like invisible redirection of connections and MAC filtering for singling out a specific host or not replying to DHCP requests from security scanners.
c4e69c01df48f32cae5b7ddcc7ffe8d28a867fdcc1d5ea4244ff74b7a234eb78
iodine is a piece of software that lets you tunnel IPv4 data through a DNS server. This can be useful in situations where Internet access is firewalled, but DNS queries are allowed. It needs a TUN/TAP device to operate. The bandwidth is asymmetrical with limited upstream and up to 1 Mbit/s downstream.
ca611ba1da2df2c1b536b8029429a67f256e813f7eb9ce21589516f7964e320d
Simple php script that perform a massive MX look up for a given list of IPs.
4659be37f7b6a979d3ff68238f8016b12e20716d56ea0330b0e55e005254c70e
Advchk (Advisory Check) reads security advisories so you do not have to. Advchk gathers security advisories using RSS feeds, compares them to a list of known services, and alerts you if you are vulnerable. Since adding hosts and services by hand would be quite a boring task, advchk leverages nmap for automatic service and version discovery.
2b851eb6af088365188b6b91e8861626ba23db195e3e829b9edac5f059841ff4
combina is a password generator that uses three different algorithms based on combinatorial analysis. It implements the permutation without repetition, permutation with repetition (the famous brute force), and combination without repetition. It supports an unlimited number of characters in the input and MD5 password hashes.
a313f066748d1b4d5b8b6adeaa0e04dea09846bf2ec02cead1a4a6f3104c6d0c
Advchk (Advisory Check) reads security advisories so you do not have to. Advchk gathers security advisories using RSS feeds, compares them to a list of known services, and alerts you if you are vulnerable. Since adding hosts and services by hand would be quite a boring task, advchk leverages nmap for automatic service and version discovery.
45b07b6f71821eee24de1739a4399a2fb88581e8b4d3e86fb5be3014a2de4316
Wondjina is basic proof of concept Perl code to show that binary files can be tunneled in a stealthy manner by using the HTTP/1.1 "entity tag" as a covert channel.
11dfdc9aa4906fd793861ee27ec16ec9252bfdd67d10ad6d05e4aa74aa9f3811
SDC, or Self Decrypting Binary Generator, creates self decrypting binaries for common operating systems and architectures. The target file is encrypted using Blowfish in Cipher text Feedback Mode (CFB) and appended to an executable which reads itself and attempts to decrypt the appended data when it is run. Targets: Linux x86 (ELF), Windows x86 (PE-COFF), OpenBSD x86 (ELF), OpenBSD arm (ELF), OpenBSD sparc64 (ELF), FreeBSD x86 (ELF), NetBSD x86 (ELF), Solaris sparc (ELF).
f8223b21d9e0665d1c51a15c3ff8648c9be5ab04838d19b5a89c5059b1b40aff
Touch2 is a utility which modifies the ctime. Touch(1) can be used to change the last-access & last-modification times on the files (or directories) you read or modify, but doing this will change the last-inode-change time to the current time. Touch2 can be run after touch(1) or other commands.
beaa155ed43ff7c33a27410bfd5934b0bbf58517b6f6e389227e99ed03714bf0
DMitry (Deepmagic Information Gathering Tool) is a UNIX/(GNU)Linux Command Line Application coded in C. DMitry has the ability to gather as much information as possible about a host. Base functionality is able to gather possible subdomains, email addresses, uptime information, tcp port scan, whois lookups, and more.
f335321a092cdc708f3222ce732299289b799602076f22e1942ed152b0f17e43
combina is a password generator that uses three different algorithms based on combinatorial analysis. It implements the permutation without repetition, permutation with repetition (the famous brute force), and combination without repetition. It supports an unlimited number of characters in the input and MD5 password hashes.
f4f839004ad233f896c7e7db673a6c5f72c5e42af415571ad2ab3493fe0dccbc
combina is a password generator that uses three different algorithms based on combinatorial analysis. It implements the permutation without repetition, permutation with repetition (the famous brute force), and combination without repetition. It supports an unlimited number of characters in the input and MD5 password hashes.
9e70a93540ea4231de8613c2ff5e528cf3e0db0897fa3a3f95acf1df0df50b15
AIM Admin: A perl script designed to accept and execute commands via the AOL Instant Messenger service. Supports crypted passwords and sends back the output of all commands.
2f0dceb8a4ac1a32a697f0a2d02db93a269402ef63f052b363983131ed147041
Arri provides an interface for accessing arrays in a safe manner that means that it is impossible to cause an overflow and, if the array is set to hard (it normally is), truncation. In addition to simply providing an interface for handling arrays, it also provides interfaces for using the arrays such as an IO API.
15ea6a61c07655d09a0585cc3729145aac56ac5e0a5ca02b1d268af5c47fd466
Pscan checks C source code for problematic uses of printf style functions such as "sprintf(buffer, variable)", which have been the source of many security holes. It does not check for buffer overflows or other misuse of function parameters.
570bdf87132b23120339e247809dc2cf37c2735d504f4e1072528c04d940bb5f
Wesley is a fake DHCP server that implements various features like invisible redirection of connections and MAC filtering for singling out a specific host or not replying to DHCP requests from security scanners.
4141b12cdfa4abc4b138353a5f8f09ad7ae2721a53d307cfb78905670c2d665c
Pop 3 scan is a full transparent proxy server for POP3 clients. It runs on a Linux box with iptables (for port redirection). It can be used to provide POP3 email scanning from the Internet to any internal network, and is ideal for helping to protect your Other OS LAN from harm, especially when used in conjunction with a firewall and other Internet proxy servers. It is designed to enable scanning of incoming email messages for viruses, worms, trojans, spam, and harmful attachments. Because viewing HTML email can enable a spammer to validate an email address (via Web bugs), it can also provide HTML stripping.
2c51185caddde414de13f7de9b94986145a6519deac1de655f38538113122329
Herodot is a tool that parses the timeline of filesystem activity created by mactime and adds human readable descriptions to it. It also understands that later changes of some mac tags hide earlier changes.
e855f365e9aae9d99d0e69d5a3b263fa17380a16ce8c0182a68fdd6d4a323a9b
RFDump is a tool to detect RFID-Tags and show their meta information: Tag ID, Tag Type, manufacturer etc. The user data memory of a tag can be displayed and modified using either a Hex or an ASCII editor. Tag contents can be stored and loaded using a specific XML format. This effectively allows the copy of data from one tag to another. In addition, the integrated cookie feature demonstrates how easy it is for a company to abuse RFID technology to spy on their customers. RFDump works with the ACG Multi-Tag Reader or similar card reader hardware. The tags that are supported for reading, writing, and editing are ISO 15693, ISO 14443 A, ISO 14443 B, SR176(1,2), Tag-it®, and I-Code®.
eb450c46669fb731fdd577fcb8a90ec71a889b1404c8bf88ae1b78d2611fd0b6
Pop 3 scan is a full transparent proxy server for POP3 clients. It runs on a Linux box with iptables (for port redirection). It can be used to provide POP3 email scanning from the Internet to any internal network, and is ideal for helping to protect your Other OS LAN from harm, especially when used in conjunction with a firewall and other Internet proxy servers. It is designed to enable scanning of incoming email messages for viruses, worms, trojans, spam, and harmful attachments. Because viewing HTML email can enable a spammer to validate an email address (via Web bugs), it can also provide HTML stripping.
f2542177fa45fe9ad6bb30fd647614d25ee68588559f91895f366bef1983cb98