exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 626 - 650 of 1,391 RSS Feed

Files

Inguma Penetration Testing Toolkit
Posted Dec 31, 2008
Authored by Joxean Koret

Inguma is a free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembler.

Changes: Many new additions, various support, and a few changes have been made.
tags | tool, scanner, python
systems | unix
SHA-256 | 8d2c9670ee8b7e32c24e719d2f3be71a7d66596177066c10ed4d9db6063ef761
telnetrecon Telnet Server Fingerprinting Tool
Posted Dec 31, 2008
Authored by Marc Ruef | Site computec.ch

telnetrecon is a tool for doing research in the field of telnet server fingerprinting.

tags | tool, scanner
systems | unix
SHA-256 | 381794d4db9b91bdb21324d29c26bbe0f88acaa4c731fbf8f51b1ce50be71322
v6 IRC Scanner Utility
Posted Dec 16, 2008
Authored by Osirys | Site y-osirys.com

v6 is a script that performs SQL Injection, local/remote file inclusion and code execution scanning. It's controlled via irc as an irc-bot. It scans on a lot of engines, performs a mass scan, and a bypass for google and yahoo.

tags | tool, remote, local, scanner, code execution, sql injection, file inclusion
systems | unix
SHA-256 | 8e71b5b683b5e169ff5eded068320ed3e6687e1d1b55d98aa69608504172e1f0
anehta-v0.6.0fixed2.zip
Posted Nov 25, 2008
Authored by axis | Site code.google.com

Anehta is a PHP/Javascript based platform to make cross site scripting and other web attacks easier.

tags | tool, web, scanner, php, javascript, xss
systems | unix
SHA-256 | 83a687fcc34e13a9a681cb1719f3c457660f3bb6a4e649890ca6fdcbbb3972d7
Fwknop Port Knocking Utility
Posted Nov 21, 2008
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Added support to fwknop for the Linux 'any' interface. Added support for interfacing fwknop with third party software through the addition of three new variables in the access.conf file. Various other fixes and additions.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | 5aff527da9609ee49281d1ed5966d462e0ac99a728ad2fd9d3550456bdc9e1e9
dps-v1.5.tar.gz
Posted Nov 17, 2008
Authored by AR Samhuri | Site securebits.org

Dynamic Port Scanner - The sole idea of the Dynamic Port Scanner (DPS) is to provide a reliable spoofed source IP port scanner. The spoofed source IP is dynamically generated at run time and it varies for every scan packet; every scan packet carries a random spoofed source IP. Traditionally, a port scan with a spoofed source IP has been considered unreliable due to the fact that reply packets would not reach back the scanning system. However, the technique used by DPS ensures the reliability of such spoofed scan.

tags | tool, scanner, spoof
systems | unix
SHA-256 | 6977ac4c194e685ceb1c93788d8af80a46260b156d97ce60f413b6d971fc8943
MultiInjectorV0.3.tar.gz
Posted Nov 13, 2008
Authored by Raviv Raz | Site chaptersinwebsecurity.blogspot.com

MultiInjector is an automatic SQL injection utility. It uses a list of URI addresses to test parameter manipulation. Once a vulnerable parameter has been found, a signature-evasive SQL injection is performed in order to achieve arbitrary OS command execution and automatic defacement on database server. Written in Python.

tags | tool, arbitrary, scanner, sql injection, python
systems | unix
SHA-256 | d0a2c499695030d18ad21ebc9dc3a13ab00abc17a9f29a9fcee08ef33b253a06
miranda.tar.gz
Posted Nov 8, 2008
Authored by Craig Heffner | Site sourcesec.com

Miranda is a Python-based Universal Plug-N-Play client application designed to discover, query and interact with UPNP devices, particularly Internet Gateway Devices (aka, routers). It can be used to audit UPNP-enabled devices on a network for possible vulnerabilities.

tags | tool, scanner, vulnerability, python
systems | unix
SHA-256 | d14d0b979b115a202bce72bdcfd7fc749f57546b53bf094e2e1119c7c9a8c158
MultiInjectorV0.2.tar.gz
Posted Nov 1, 2008
Authored by Raviv Raz | Site chaptersinwebsecurity.blogspot.com

MultiInjector is an automatic SQL injection utility. It uses a list of URI addresses to test parameter manipulation. Once a vulnerable parameter has been found, a signature-evasive SQL injection is performed in order to achieve arbitrary OS command execution and automatic defacement on database server. Written in Python.

tags | tool, arbitrary, scanner, sql injection, python
systems | unix
SHA-256 | 053642943fce855d2e68c167757673ebc92b6e058a62c270f3a4b7107a3f2338
iaxscan-0.02.tar.gz
Posted Oct 16, 2008
Authored by nnp | Site code.google.com

iaxscan is a Python based scanner for detecting live IAX/2 hosts and then enumerating (by bruteforce) users on those hosts. It does so, in an obvious fashion, by sending valid IAX/2 requests and monitoring responses.

tags | tool, scanner, python
systems | unix
SHA-256 | 1f293ca923f0b309d7117438dd3726662dcb041a64975f0b23a14c0edba46c03
mms-03.tgz
Posted Oct 14, 2008
Site scrt.ch

Mini MySqlat0r is a multi-platform application used to audit web sites in order to discover and exploit SQL injection vulnerabilities. It is written in Java and is used through a user-friendly GUI that contains three distinct modules. Program and source code are both included in this tarball.

tags | tool, java, web, scanner, vulnerability, sql injection
systems | unix
SHA-256 | 95902f9cedcdb90d235f803f2d02db948f8175d74924df36c0e7ff6a3dee0ed4
depant-0.1a.tgz
Posted Oct 14, 2008
Authored by Aaron Peterson | Site midnightresearch.com

Depant, or DEfault PAssword Network Tool, is a scanner that will map out your local network and attempt to check it with a default password list.

tags | tool, local, scanner
systems | unix
SHA-256 | 01ae9bbbe203daea0415ebe9e9602fc333a76b08e2fed0b767aa9e341dfba98f
Scapy Packet Manipulation Tool 2.0.0.10
Posted Oct 9, 2008
Authored by Philippe Biondi | Site secdev.org

Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc.

Changes: Various bug fixes and enhancements.
tags | tool, scanner, python
systems | unix
SHA-256 | 56f18529124331067e2758128a8979cdd106b10adf34f560246cb2bf3900102e
Fwknop Port Knocking Utility
Posted Oct 1, 2008
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Added GPG_NO_REQUIRE_PREFIX to access.conf. Bugfix to make sure that neither fwknop nor fwknopd reference any options file in GnuPG mode. Added the ability to control the path used for the gpg binary. Various other fixes and additions.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | cbca7184b4fd7ca14c3895bc11c96bef5d4ff3b6abacc9e5653b1362fc05be0f
geoipgen0.2b.tgz
Posted Oct 1, 2008
Authored by Andrew Horton | Site morningstarsecurity.com

geoipgen is an IP network tool written in Ruby for generating geotargeted lists of IP Addresses using MaxMind's Free Open Source GeoLite Country database (www.maxmind.com). Examples: Generate all IPs for New Zealand (./geoipgen -s nz), generate 10,000 random ips for far east asia (geoipgen -n 10000 cn hk mn tw mo jp kr kp), indefinitely generate random ips for japan (geoipgen jp).

tags | tool, scanner, ruby
systems | unix
SHA-256 | de5dbe5d6bee824eb382c532b8b1eac4a1af8c5571357c68be53c5ab6f41251d
sp3.rar
Posted Sep 28, 2008
Authored by real | Site real.o-n.fr

SQL Playground (sp) is a command line prompt written in PHP which aims to provide an adapted environment for SQL injection attacks.

tags | tool, scanner, php, sql injection
systems | unix
SHA-256 | 8a370f02cb9f556843ac5dbfa0eba508c8b4bf3827ae20a5a79be961b6e89b32
synner.c
Posted Sep 10, 2008
Authored by sm4x

Synner is a custom eth->ip->tcp packet generator (spoofer) for testing firewalls and dos attacks. It is capable of sending large amounts of prebuilt tcp packets (very quickly) with user defined ips, macs, tcp flags, window sizes, payload lengths and more.

tags | tool, scanner, tcp
systems | unix
SHA-256 | 23183ba81181a55b030c49ac1a3492fe2cd5491d498638603c826c1105c6b7e9
proxyScan-0.3.tgz
Posted Sep 9, 2008
Authored by Ed Blanchfield | Site e-things.org

proxyScan.pl is a security penetration testing tool to scan for hosts and ports through a Web proxy server. Features include various HTTP methods such as GET, CONNECT, HEAD as well as host and port ranges.

tags | tool, web, scanner
systems | unix
SHA-256 | 6eced49949c30e88205a4cd63d797c5592dcfaa4de30d29dbe99df9e6b80fa9a
informer.txt
Posted Sep 8, 2008
Authored by sm4x

1nf0rm3r is a quick perl script that extracts database information from a website once leveraging a SQL injection vulnerability.

tags | tool, scanner, perl, sql injection
systems | unix
SHA-256 | 23db654aefd969cf38abbe0eb1ec9bb10aff74bceaba77a604a4dfa58320ab4b
Lynis Auditing Tool 1.2.0
Posted Aug 29, 2008
Authored by Michael Boelen | Site cisofy.com

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

Changes: Multiple new tests added, various support added, and various changes.
tags | tool, scanner
systems | unix
SHA-256 | a41a081e1d1074f88648a1ab30268e78a9587597eb81d590110b220f81570eff
Fwknop Port Knocking Utility
Posted Aug 26, 2008
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Mirek Trmac from Red Hat contributed several patches so that fwknop can be bundled within the Fedora Linux distribution. Updated fwknop, fwknopd, and knoptm to import perl modules out of the /usr/lib/fwknop/ directory if it exists. Added module version output for each non-core perl module used by fwknop and fwknopd in --debug mode. Various other additions and fixes.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | c2835d4522a45737392c181df6459fb3db2755b779a246601d66359fd8e12d20
Grendel-Scan-v1.0-src.zip
Posted Aug 20, 2008
Authored by David Byrne | Site grendel-scan.com

Grendel-Scan is an open-source web application security testing tool. It has an automated testing module for detecting common web application vulnerabilities, and features geared at aiding manual penetration tests.

tags | tool, web, scanner, vulnerability
systems | unix
SHA-256 | f0e88e81fc5d68b909dc6c52a69acd37b6a4d7db0c5e3ae8845fea7fb37b770c
modscan.py.txt
Posted Aug 20, 2008
Authored by Mark Bristow | Site modscan.googlecode.com

ModScan is a new tool designed to map a SCADA MODBUS TCP based network. The tool is written in python for portability and can be used on virtually any system with few required libraries.

tags | tool, scanner, tcp, python
systems | unix
SHA-256 | f3861f67361b501c6745b1195bcca1030cb64261fd6413058e719cd793f110f7
porkbind-1.3.tar.gz
Posted Aug 18, 2008
Authored by Derek Callaway | Site innu.org

Porkbind is a robust and recursive DNS server vulnerability scanner which retrieves version.bind information for the nameservers and produces a report.

Changes: Wrote in-a-bind shell script that scans random domain names from DMOZ. Implemented recursive query testing. Various other fixes and additions.
tags | tool, scanner
systems | unix
SHA-256 | 1a6200c30cab94df89185c5ecc111077d4113e78f19d537026a21c02ab6e55a9
inguma-0.0.9.1.tar.gz
Posted Aug 13, 2008
Authored by Joxean Koret

Inguma is a free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembler.

Changes: Various bug fixes, new modules added, and a lot of new exploits.
tags | tool, scanner, python
systems | unix
SHA-256 | e5c56aed374969acc0d9b93fac8849bb83482705761f98a010ffad11047b6ca6
Page 26 of 56
Back2425262728Next

Top Authors In Last 30 Days

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close