what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 701 - 725 of 1,391 RSS Feed

Files

c1zc0-ban.tar.gz
Posted Dec 10, 2007
Authored by rotor

Simple IPv4 and IPv6 banner grabbing scripts.

tags | tool, scanner
systems | unix
SHA-256 | 57db79dc569f940f827eb9c541e6be8c77ec7cfd6f76c6ae864e6b3ed60a4cee
sambascan2-0.4.1.tar.gz
Posted Dec 10, 2007
Authored by Claudio Clemens | Site asturio.gmxhome.de

Sambascan2 allows you to search an entire network or a number of hosts for SMB shares. It will also list the contents of all public shares that it finds. The difference between sambascan2 and other SMB viewers and scanners is that it will search everything using TCP/IP, and it will not send a lot of broadcast messages, so it can be used over LAN boundaries. It only uses SMB to list the shares and their contents.

Changes: This version adds another parameter to scan hosts in a file.
tags | tool, scanner, tcp
systems | unix
SHA-256 | f080548939c756b572d90221a984e026776f38496e613223baa587ce31fd4150
Fwknop Port Knocking Utility
Posted Nov 26, 2007
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Multiple additions, some updates, and a bug fix.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | 366dbb0c9ae38973cee960408eb1a76ed6ff544f15855affaed93331face9491
freewvs-0.1.tar.bz2
Posted Nov 15, 2007
Authored by Hanno Boeck | Site source.schokokeks.org

Freewvs is a tool to search web roots for known vulnerable versions of web applications.

tags | tool, web, root, scanner
systems | unix
SHA-256 | 2e9c27f6e626fef7aa38d3e7b98a01a05a47689c85c5f26e63d231fdc715a024
pkmap-0.1e.bz2
Posted Nov 13, 2007
Authored by skrye | Site nelaxis.org

PKMap is a functional packet manipulator/injector. It currently supports ETH/IP/TCP/UDP/ICMP/(R)ARP.

tags | tool, udp, scanner, tcp
systems | unix
SHA-256 | 766b8918be4c6c569ead7cdfcca4cf9d11dad30b18816b81fc5ab9f016622d9e
inguma-0.0.5.1.tar.gz
Posted Oct 23, 2007
Authored by Joxean Koret

Inguma is a free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembler.

Changes: Added an exploit, modules, a tool, and password crackers.
tags | tool, scanner, python
systems | unix
SHA-256 | 43a552e512b8861681b69844961c7428f2bac3f6ad0e5fec9cf4a463e848fbb6
joomlascan.py.txt
Posted Oct 18, 2007
Authored by d3hydr8 | Site darkc0de.com

This Joomla scanner scans for known vulnerable remote file inclusion paths and files. Written in Python.

tags | tool, remote, scanner, python, file inclusion
systems | unix
SHA-256 | abb0310e8c6d9b179363d94f5398019494016c60f02f1dcfde8b84aa865c5a72
sqlninja-0.2.1-r1.tgz
Posted Oct 9, 2007
Authored by icesurfer | Site sqlninja.sourceforge.net

sqlninja is a small tool to exploit SQL injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end. Its main goal is to provide a remote shell on the vulnerable database server, even in a very hostile environment. It should be used by penetration testers to help and automate the process of taking over a database Server when a SQL injection vulnerability has been discovered. It is written in perl and runs on Unix-like boxes.

Changes: New flavor of bruteforce attack, auth mode detection, and various other enhancements and bug fixes.
tags | tool, remote, web, shell, scanner, perl, vulnerability, sql injection
systems | unix
SHA-256 | e1f2978750e3d86dc04e6d185157d4936156bc2761f67fb73ff822ccd721f704
p0f-2.0.8-db-20070919.tar.gz
Posted Sep 20, 2007
Authored by Michal Zalewski, David Coomber | Site lcamtuf.coredump.cx

p0f performs passive OS detection by watching SYN packets with tcpdump. Additionally, it is able to determine distance to the remote host, and can be used to determine the structure of a foreign or local network. When running on the gateway of a network it is able to gather huge amounts of data and provide useful statistics. On a user-end computer it could be used to track which operating systems are making each connection. p0f supports full tcpdump-style filtering expressions, and has an easily modified fingerprinting database. Note that this version is the win32 compiled version. Original code by Michal Zalewski, compiling by David Coomber.

Changes: Insufficient OS description escapes fixed. Other fixes.
tags | tool, remote, local, scanner
systems | windows, unix
SHA-256 | dd38a277cf5f75bd141c92c52d4a943be4377fb60f3ec5a8fd8b6e6d380f4122
Fwknop Port Knocking Utility
Posted Sep 19, 2007
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Added fwknopd server support for Mac OS X. Various other bug fixes and improvements.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | ac87bac78e9396f01d93b9abe1dab1d480a5be4898c824ca464ce1c82fca89a7
inguma-0.0.3.tar.gz
Posted Sep 7, 2007
Authored by Joxean Koret

Inguma is a free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembler.

tags | tool, scanner, python
systems | unix
SHA-256 | 523cb75e2904a5baaab11420acd5d4ebab73e8744c2ba5ea5d3e5c18c17dcde8
sqlninja-0.1.3.tgz
Posted Aug 30, 2007
Authored by icesurfer | Site sqlninja.sourceforge.net

sqlninja is a small tool to exploit SQL injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end. Its main goal is to provide a remote shell on the vulnerable database server, even in a very hostile environment. It should be used by penetration testers to help and automate the process of taking over a database Server when a SQL injection vulnerability has been discovered. It is written in perl and runs on Unix-like boxes.

Changes: A faster bruteforce engine plus a bunch of small fixes and improvements.
tags | tool, remote, web, shell, scanner, perl, vulnerability, sql injection
systems | unix
SHA-256 | 578cde4354497e37327dc9367a4441735803548cf1e9a405959cf506846daf48
synscan-5.0b8.tar.gz
Posted Aug 27, 2007
Authored by mu-b, John Anderson | Site digit-labs.org

SynScan is a fast half-open port scanner. This tool will send TCP packets with the SYN flag to any block of destination addresses at very high speed. SynScan endeavors to send traffic as fast as the host network interface can support.

tags | tool, scanner, tcp
systems | unix
SHA-256 | 3924cdfbf8c1a779b860432690b7cdfb61b87f7a8674b3c78b9a7593e21c3ed8
XSSscan.py.txt
Posted Aug 27, 2007
Authored by d3hydr8 | Site darkcode.h1x.com

XSSscan is a cross site scripting scanner that can take output from google or can search one site. It is written in Python.

tags | tool, scanner, xss, python
systems | unix
SHA-256 | cbda61486e9490d7855d5c62130ff47ae78f5be4998bd44d5fec4cd851a1f840
squeeza-0.21.tar.gz
Posted Aug 11, 2007
Authored by Haroon Meer, Marco Slaviero | Site sensepost.com

squeeza is a tool helps exploits SQL injection vulnerabilities in broken web applications. Its functionality is split into creating data on the database (by executing commands, copying in files, issuing new SQL queries) and extracting that data through various channels (dns, timing, http error messages).

tags | tool, web, scanner, vulnerability, sql injection
systems | unix
SHA-256 | ed5de3ae05d77b7285523cc1c34484c73029565ace873988605f4b640b76d635
ndisc6-0.9.3.tar.bz2
Posted Aug 9, 2007
Authored by Remi Denis-Courmont | Site people.via.ecp.fr

ndisc consists or two small command line tools (ndisc and rdisc) that perform ICMPv6 Neighbor Discovery and ICMPv6 Router Discovery respectively. It is primarily meant for IPv6 networking diagnostics or to detect rogue IPv6 nodes or routers on an Ethernet segment.

Changes: Updated gettext. Some other minor changes.
tags | tool, scanner
systems | unix
SHA-256 | 13f238cc03e43dd05020755b3a5ec57d3cfa1eecfba71dc00157d26351afe718
SQLPowerInjectorSourceCodev1.2.rar
Posted Jul 17, 2007
Authored by Francois Larouche | Site sqlinjector.com

SQL Power Injector is a graphical application created in C# .Net 1.1 that helps the penetration tester to inject SQL commands on a web page. Its main strength is its capacity to automate tedious blind SQL injection with several threads. Released under the Clarified Artistic License.

tags | tool, web, scanner, sql injection
systems | unix
SHA-256 | 8aedf196b1476d7ea434cf3da9360cb5515f5099e85f117ec149f034fa863bb6
proxyScan-0.2.tgz
Posted Jul 12, 2007
Authored by Ed Blanchfield | Site e-things.org

proxyScan.pl is a security penetration testing tool to scan for hosts and ports through a Web proxy server. Features include various HTTP methods such as GET, CONNECT, HEAD as well as host and port ranges.

tags | tool, web, scanner
systems | unix
SHA-256 | 225317c491c73020a70f12fc88eb850b91684e2c7440b063846fe4562d4fab69
proxyScan-0.1.txt
Posted Jul 7, 2007
Authored by Ed Blanchfield | Site e-things.org

proxyScan.pl is a security penetration testing tool to scan for hosts and ports through a Web proxy server. Features include various HTTP methods such as GET, CONNECT, HEAD as well as host and port ranges.

tags | tool, web, scanner
systems | unix
SHA-256 | 1c2fa744beb99f46844eb518721c9c32d048bf7b15541d6acbef6457faedf066
ISR-sqlget-1.0.0.tar.gz
Posted Jun 26, 2007
Authored by Francisco Amato | Site infobyte.com.ar

ISR-sqlget is a blind SQL injection tool developed in Perl. It supports 20 databases, has various evasions features, SSL and proxy support, and more.

tags | tool, scanner, perl, sql injection
systems | unix
SHA-256 | 4ac98124e44160901dbd4f0fd6e7b92ffa530dcbfcbc73d2f2122fe5549a1093
sqlninja-0.1.2.tgz
Posted Jun 21, 2007
Authored by icesurfer | Site sqlninja.sourceforge.net

sqlninja is a small tool to exploit SQL injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end. Its main goal is to provide a remote shell on the vulnerable database server, even in a very hostile environment. It should be used by penetration testers to help and automate the process of taking over a database Server when a SQL injection vulnerability has been discovered. It is written in perl and runs on Unix-like boxes.

Changes: Test mode added. Debug option added. Other minor changes.
tags | tool, remote, web, shell, scanner, perl, vulnerability, sql injection
systems | unix
SHA-256 | d018a3c450f2814616d6e10df371981fd19d86b0ea6ec4a05bb5734096679281
pixy_3_01.zip
Posted Jun 21, 2007
Site seclab.tuwien.ac.at

Pixy is an open source vulnerability scanner that audits PHP applications for SQL injection and cross site scripting vulnerabilities. It is written in Java and also performs automatic resolution of file inclusions.

tags | tool, java, scanner, php, vulnerability, xss, sql injection, file inclusion
systems | unix
SHA-256 | 50824432cbbb0d2d08b83b3f850b36829dbcd2cb0e67f5b30bea566423e3c709
p0f-2.0.8-win32.zip
Posted Jun 19, 2007
Authored by Michal Zalewski, David Coomber | Site lcamtuf.coredump.cx

p0f performs passive OS detection by watching SYN packets with tcpdump. Additionally, it is able to determine distance to the remote host, and can be used to determine the structure of a foreign or local network. When running on the gateway of a network it is able to gather huge amounts of data and provide useful statistics. On a user-end computer it could be used to track which operating systems are making each connection. p0f supports full tcpdump-style filtering expressions, and has an easily modified fingerprinting database. Note that this version is the win32 compiled version. Original code by Michal Zalewski, compiling by David Coomber.

tags | tool, remote, local, scanner
systems | windows, unix
SHA-256 | e5665aaef9dea1dbdd6c08e7f76453874a605f513f2c431e34a940104a886c8e
Samotny_pi3.c
Posted Jun 6, 2007
Authored by Adam Zabrocki | Site pi3.int.pl

Port scanner that can perform SYN, FIN, NULL, and XMAS scans with options to perform them very slowly and in decoy mode.

tags | tool, scanner
systems | unix
SHA-256 | 2bcf0d84a7c42318177d48b119992c9c9bd61b342e62e2177213a4f763875e11
Fwknop Port Knocking Utility
Posted Jun 6, 2007
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Added support for ipfw firewalls. Added init script for FreeBSD systems. Various other additions and updates.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | 3d63f585dc5fcdbe56fc900d442168c00d79d149b4596cd0f514d17c8a2f28c3
Page 29 of 56
Back2728293031Next

Top Authors In Last 30 Days

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close