Twenty Year Anniversary
Showing 1 - 25 of 1,006 RSS Feed

Files

I2P 0.9.34
Posted Apr 11, 2018
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Various updates and bug fixes.
tags | tool
systems | unix
MD5 | 3c67dc2428ca6159110dfe18be80571f
Chameleon Mini Smartcard Emulator Iceman Fork Rebooted Blue GUI 1.1
Posted Apr 2, 2018
Authored by Christian Herrmann | Site github.com

This is a mostly working firmware for the ChameleonMini RevE rebooted device. It compiles without errors or warnings and gives you more or less the same functionality as the stock firmware. This version compiles and gives you the same functionality (and more) as the original Chameleon Mini rebooted GUI.

Changes: Multiple new features added including user-friendly dump file management and improved GUI layout.
tags | tool
systems | unix
MD5 | 1c74d930570e8f705ea21126eac3e13a
AIEngine 1.8.3
Posted Mar 7, 2018
Authored by Luis Campo Giralte | Site bitbucket.org

AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.

Changes: Enable and disable protocols on the bindings. Reduce a 6% the memory consumption of the Flows. Support for logging the user interaction on log files. Various other updates.
tags | tool
systems | unix
MD5 | 7894ccbf30ed989379dda37167566e18
I2P 0.9.33
Posted Jan 30, 2018
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Various updates and bug fixes.
tags | tool
systems | unix
MD5 | 5df27a8123a0bb60caa952e119929b41
Blue Team Training Toolkit (BT3) 2.6
Posted Jan 28, 2018
Authored by Juan J. Guelfo | Site encripto.no

Blue Team Training Toolkit (BT3) is an attempt to introduce improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. The Blue Team Training Toolkit is written in Python, and it includes the latest versions of Encripto's Maligno and Pcapteller.

Changes: This release introduces multiple new API-related commands, UI improvements and other minor adjustments.
tags | tool, python
systems | unix
MD5 | 1145bab71d9f4d1c2dcc6fc8703d5705
Packet Fence 7.4.0
Posted Jan 26, 2018
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: New database access layer (DAL) for upcoming multi-tenancy support. New portal module to permanently set roles. Added portal module for selecting a role for the device being registered on the portal. Various other updates and enhancements.
tags | tool, remote
systems | unix
MD5 | d365a869a5195892e7e2423efd773e46
Evilgrade - The Update Exploitation Framework 2.0.9
Posted Jan 25, 2018
Authored by Francisco Amato | Site infobyte.com.ar

Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates. This framework comes into play when the attacker is able to make traffic redirection, and such thing can be done in several ways such as: DNS tampering, DNS Cache Poisoning, ARP spoofing Wi-Fi Access Point impersonation, DHCP hijacking with your favorite tools. This way you can easy take control of a fully patched machine during a penetration test in a clean and easy way. The main idea behind the is to show the amount of trivial errors in the update process of mainstream applications.

Changes: Adding aheader support and a new SoapUI module.
tags | tool, spoof
systems | unix
MD5 | 9d0ef1ad41141f40f9308b28d932887d
Chameleon Mini Smartcard Emulator Iceman Fork Rebooted Green GUI 1.0
Posted Jan 24, 2018
Authored by Christian Herrmann | Site github.com

This is the first version of a mostly working firmware for the ChameleonMini RevE rebooted device. It compiles without errors or warnings and gives you more or less the same functionality as the stock firmware. This version compiles and gives you the same functionality (and more) as the original Chameleon Mini rebooted GUI.

tags | tool
systems | unix
MD5 | 602c1370eecc0356ef36c23dcd2b9004
Chameleon Mini Smartcard Emulator Iceman Fork 1.0
Posted Jan 19, 2018
Authored by Christian Herrmann | Site github.com

This is the first version of a mostly working firmware for the ChameleonMini RevE rebooted device. It compiles without errors or warnings and gives you more or less the same functionality as the stock firmware. This release is fully compatible with the GUI software that is bundled with the device upon purchase.

tags | tool
systems | unix
MD5 | e9055dffce99d4c584c0f6b85fe00642
Chameleon Mini Smartcard Emulator Iceman Fork
Posted Nov 27, 2017
Authored by Christian Herrmann | Site github.com

This is the Iceman fork of the Chameleon Mini source code for the firmware. The Chameleon Mini is a versatile contactless smartcard emulator compliant to NFC. A popular hardware revision is the Chameleon Mini rev E - rebooted.

tags | tool
systems | unix
MD5 | ee923f569a98d7b0c1affe7cb8b4651b
AIEngine 1.8.2
Posted Nov 25, 2017
Authored by Luis Campo Giralte | Site bitbucket.org

AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.

Changes: Fixed issue with HTTP Payloads. Added anomaly for long emails on SMTP. Various other updates.
tags | tool
systems | unix
MD5 | 6632355e078f02d22f1a81a500238e90
Haveged 1.9.2
Posted Nov 17, 2017
Site issihosts.com

haveged is a daemon that feeds the /dev/random pool on Linux using an adaptation of the HArdware Volatile Entropy Gathering and Expansion algorithm invented at IRISA. The algorithm is self-tuning on machines with cpuid support, and has been tested in both 32-bit and 64-bit environments. The tarball uses the GNU build mechanism, and includes self test targets and a spec file for those who want to build an RPM.

Changes: Added cross compile fixes contributed by Robert Schwebel. Limited watermark max to less than pool size to avoid 100% cpu condition. Added service.suse init script.
tags | tool
systems | linux, unix
MD5 | fb1d8b3dcbb9d06b30eccd8aa500fd31
I2P 0.9.32
Posted Nov 14, 2017
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: This release contains a number of fixes in the router console and associated webapps (addressbook, i2psnark, and susimail). Various updates and bug fixes.
tags | tool
systems | unix
MD5 | d11d9f9cc9927dddc9d2089a1aaaeb80
Linux Soft Exploit Suggester 0.6
Posted Nov 6, 2017
Authored by Belane | Site github.com

linux-soft-exploit-suggester finds exploits for all vulnerable software in a system helping with the privilege escalation. It focuses on software packages instead of Kernel vulnerabilities.

tags | tool, kernel, vulnerability
systems | linux, unix
MD5 | b248537a3fb85ecece3d4a20f333b5d7
Packet Fence 7.3.0
Posted Sep 25, 2017
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: Added a RADIUS only mode to PacketFence. Added the possibility to import switches from a CSV file. Added a cluster wide view of pfqueue statistics. Added the possibility of importing switches from a CSV file.
tags | tool, remote
systems | unix
MD5 | 324b19e3dcf03c3e29e6d0068093a250
Blue Team Training Toolkit (BT3) 2.5
Posted Sep 12, 2017
Authored by Juan J. Guelfo | Site encripto.no

Blue Team Training Toolkit (BT3) is an attempt to introduce improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. The Blue Team Training Toolkit is written in Python, and it includes the latest versions of Encripto's Maligno and Pcapteller.

Changes: Bug fixes and minor adjustments.
tags | tool, python
systems | unix
MD5 | 80ed0156b08d33062b359eb27242d763
Blue Team Training Toolkit (BT3) 2.4
Posted Sep 4, 2017
Authored by Juan J. Guelfo | Site encripto.no

Blue Team Training Toolkit (BT3) is an attempt to introduce improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. The Blue Team Training Toolkit is written in Python, and it includes the latest versions of Encripto's Maligno and Pcapteller.

Changes: Improved input validation routines. Pcapteller module now supports SMB/SMB2 and NBNS packet payload manipulation. Documentation updates and minor adjustments.
tags | tool, python
systems | unix
MD5 | c8f995b15e574362d9b037998e82913a
360-FAAR Firewall Analysis Audit And Repair 0.6.3
Posted Aug 24, 2017
Authored by Dan Martin | Site sourceforge.net

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Changes: This release updates the config parsers to permit you to specify the default service set used to scan rules and service objects. Various other updates.
tags | tool, perl
systems | unix
MD5 | 2cba5e7f228859fd636962a64d3f49d0
AIEngine 1.8.1
Posted Aug 22, 2017
Authored by Luis Campo Giralte | Site bitbucket.org

AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.

Changes: Support for Go language. Support for SSH protocol. Retrieve the SSL cipher id used on the conversation. Optimization of DatabaseAdaptor handler. Various other updates.
tags | tool
systems | unix
MD5 | 5a141d38b9079c4f281f4173007d53a7
Check Siem 201708.05
Posted Aug 14, 2017
Authored by Stephan Schmieder

check_siem is a security incidents and events monitor written in Perl. It reports on unusual user, process, net, and file activities by leveraging fuzzy LSOF statistics. Think of it as a fun-sized HIDS.

tags | tool, perl
systems | unix
MD5 | 1aea048508da5cbbeaf7f61b00c2598f
OpenDNSSEC 2.1.3
Posted Aug 10, 2017
Site opendnssec.org

OpenDNSSEC is software that manages the security of domain names on the Internet. The project intends to drive adoption of Domain Name System Security Extensions (DNSSEC) to further enhance Internet security.

Changes: Various bug fixes.
tags | tool
systems | unix
MD5 | 2ff24d853aceac6e9d082bd0135dbaa9
Swap Digger 1.0
Posted Aug 8, 2017
Authored by Emeric Nasi

swap_digger is a bash script used to automate Linux swap analysis for post-exploitation or forensics purpose. It automates swap extraction and searches for Linux user credentials, Web form credentials, Web form emails, HTTP basic authentication, WiFi SSID and keys, etc.

tags | tool, web, bash
systems | linux, unix
MD5 | ce88e554ecf00a5e8c7c68abb1bdacb4
I2P 0.9.31
Posted Aug 8, 2017
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Various updates and bug fixes.
tags | tool
systems | unix
MD5 | e389d36f99899bf2b2e0871f29fc5e21
Blue Team Training Toolkit (BT3) 2.3
Posted Jul 15, 2017
Authored by Juan J. Guelfo | Site encripto.no

Blue Team Training Toolkit (BT3) is an attempt to introduce improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. The Blue Team Training Toolkit is written in Python, and it includes the latest versions of Encripto's Maligno and Pcapteller.

Changes: Maligno module now supports DEBUG and PATCH HTTP methods. Pcapteller module now supports packet payload manipulation. New API commands have been implemented. Update routine now downloads and deploys new BT3 versions automatically. Documentation updates and minor adjustments.
tags | tool, python
systems | unix
MD5 | 30acf59e597e0502bda33d1c85ad4a51
Packet Fence 7.2.0
Posted Jul 11, 2017
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: Added support for authenticating users through OpenID Connect. Added passthroughs for devices in violation state. Added ability to report a device lost or stolen in self-service portal. Added ability to change a local account password in self-service portal. Improved overall user experience of self-service portal.
tags | tool, remote
systems | unix
MD5 | 69becdd4910bbcab5e70e7f7fa0329e5
Page 1 of 41
Back12345Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

Recent News

News RSS Feed
Iran's Banks Banned From Dealing In Crypto Currencies
Posted Apr 23, 2018

tags | headline, government, bank, iran, cryptography
RSA Fails To Assess Vendor, Leaks Attendee Details
Posted Apr 21, 2018

tags | headline, privacy, phone, data loss, flaw, conference, rsa
Trustjacking Exploit Abuses iTunes Feature To Spy On iOS Devices
Posted Apr 21, 2018

tags | headline, flaw, apple, conference
Ex-Employee Sun Trust Helps Compromise 1.5 Million Bank Clients
Posted Apr 21, 2018

tags | headline, privacy, bank, cybercrime, data loss, fraud
Teen Who Hacked Ex-CIA Director John Brennan Gets 2 Years In Prison
Posted Apr 21, 2018

tags | headline, hacker, government, usa, britain, cia
Google's Project Zero Exposes Unpatched Windows 10 Lockdown Bypass
Posted Apr 20, 2018

tags | headline, microsoft, flaw, google
LinkedIn Bug Allowed Data To Be Stolen From User Profiles
Posted Apr 20, 2018

tags | headline, privacy, data loss, flaw, social
Oracle Releases 254 Security Fixes
Posted Apr 20, 2018

tags | headline, flaw, patch, oracle, java
Yahoo! Webmail Hackers Faces 8 Years Inside
Posted Apr 20, 2018

tags | headline, hacker, email, yahoo
JP Morgan Ousted Security Chief Backed By Palantir After Executives Found Out He Was Spying On Them
Posted Apr 20, 2018

tags | headline, privacy, bank, fraud, spyware
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close