Twenty Year Anniversary
Showing 1 - 25 of 1,018 RSS Feed

Files

Packet Fence 8.1.0
Posted Jul 11, 2018
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: Added support for dynamic PSK (Cisco IPSK) for the Cisco WLC and hostapd. Added Ubiquiti Unifi web authentication and 802.1X support. Added support for Cambium AP module for 802.1X, MAC and web authentication. Various other additions and updates.
tags | tool, remote
systems | unix
MD5 | 6c4cc0d195d58a30ecba2ab4080e7d05
I2P 0.9.35
Posted Jun 26, 2018
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: This version includes SusiMail folders and SSL Wizard.
tags | tool
systems | unix
MD5 | 5a1cc327e64503f7fabc69b01971052d
msploitego 1.0
Posted Jun 14, 2018
Authored by Marc Gurreri | Site github.com

msploitego is the pentesting suite for Maltego. msploitego leverages the data gathered in a Metasploit database by enumerating and creating specific entities for services. Services like samba, smtp, snmp, http have transforms to enumerate even further.

tags | tool, web
systems | unix
MD5 | b5ee5e860e2add6704f93dae60d076cc
AIEngine 1.9.0
Posted Jun 10, 2018
Authored by Luis Campo Giralte | Site bitbucket.org

AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.

Changes: Fixed an issue on SSL issuer certificate. Improvements on SSL for support TLS 1.3 Various other updates.
tags | tool
systems | unix
MD5 | b3862e8ef5ece3dec691ea940c7ff0c4
m4ngl3m3! 0.1 Password Generator
Posted Jun 10, 2018
Authored by localh0t

m4ngl3m3! version 0.1 is a common password pattern generator using a strings list.

tags | tool
systems | unix
MD5 | f69803fe7947247542e06f9599bab082
Blue Team Training Toolkit (BT3) 2.7
Posted May 16, 2018
Authored by Juan J. Guelfo | Site encripto.no

Blue Team Training Toolkit (BT3) is an attempt to introduce improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. The Blue Team Training Toolkit is written in Python, and it includes the latest versions of Encripto's Maligno and Pcapteller.

Changes: This release introduces an improved BT3 API account registration process, support for Ubuntu 18.04 LTS, and other minor adjustments.
tags | tool, python
systems | unix
MD5 | 39ea7027de33d3f510ceceb4aa8433e0
rldns 1.2
Posted May 11, 2018
Authored by Ringlayer | Site ringlayer.net

rldns is an open source lightweight DNS server for linux, netbsd, freebsd, and openbsd. Runs on x86 and x86_64 architectures.

Changes: Various updates.
tags | tool, x86
systems | linux, netbsd, unix, freebsd, bsd, openbsd
MD5 | 5b3cb3b9e8efbdc698d6294abcbf309d
Packet Fence 8.0.1
Posted May 11, 2018
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: Updated the computername (hostname) of a node using the Fingerbank Collector data. Detects uplinks based on CDP flag instead of a string. Puts etcd in its own directory. Various other updates.
tags | tool, remote
systems | unix
MD5 | a6d368ae5363b174e4c15bcf493a5f21
Packet Fence 8.0.0
Posted Apr 27, 2018
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: Replaced the ISC DHCP server with a new Golang-based DHCP server. Now supporting inline enforcement in active/active clusters. Replaced pfdns with a new Golang-based DNS server. Various other updates.
tags | tool, remote
systems | unix
MD5 | 2bb7f7d86e58111a3c819d11c5e4cd9b
Linux Exploit Suggester 0.9
Posted Apr 24, 2018
Authored by mzet

Linux Exploit Suggester is a tool to help identify possible privilege escalation attack vectors on target Linux machine by suggesting possible exploits.

tags | tool
systems | linux, unix
MD5 | 267eae30058f656e16b58652bad2e0f1
I2P 0.9.34
Posted Apr 11, 2018
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Various updates and bug fixes.
tags | tool
systems | unix
MD5 | 3c67dc2428ca6159110dfe18be80571f
Chameleon Mini Smartcard Emulator Iceman Fork Rebooted Blue GUI 1.1
Posted Apr 2, 2018
Authored by Christian Herrmann | Site github.com

This is a mostly working firmware for the ChameleonMini RevE rebooted device. It compiles without errors or warnings and gives you more or less the same functionality as the stock firmware. This version compiles and gives you the same functionality (and more) as the original Chameleon Mini rebooted GUI.

Changes: Multiple new features added including user-friendly dump file management and improved GUI layout.
tags | tool
systems | unix
MD5 | 1c74d930570e8f705ea21126eac3e13a
APT2 - An Automated Penetration Testing Toolkit 1.0
Posted Mar 15, 2018
Authored by MooseDojo | Site github.com

This tool will perform an NMap scan, or import the results of a scan from Nexpose, Nessus, or NMap. The processed results will be used to launch exploit and enumeration modules according to the configurable Safe Level and enumerated service information. All module results are stored on localhost and are part of APT2's Knowledge Base (KB). The KB is accessible from within the application and allows the user to view the harvested results of an exploit module.

Changes: BlackHatAsia release.
tags | tool
systems | unix
MD5 | d093eab397b0ff080de84f149ce70319
AIEngine 1.8.3
Posted Mar 7, 2018
Authored by Luis Campo Giralte | Site bitbucket.org

AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.

Changes: Enable and disable protocols on the bindings. Reduce a 6% the memory consumption of the Flows. Support for logging the user interaction on log files. Various other updates.
tags | tool
systems | unix
MD5 | 7894ccbf30ed989379dda37167566e18
I2P 0.9.33
Posted Jan 30, 2018
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Various updates and bug fixes.
tags | tool
systems | unix
MD5 | 5df27a8123a0bb60caa952e119929b41
Blue Team Training Toolkit (BT3) 2.6
Posted Jan 28, 2018
Authored by Juan J. Guelfo | Site encripto.no

Blue Team Training Toolkit (BT3) is an attempt to introduce improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. The Blue Team Training Toolkit is written in Python, and it includes the latest versions of Encripto's Maligno and Pcapteller.

Changes: This release introduces multiple new API-related commands, UI improvements and other minor adjustments.
tags | tool, python
systems | unix
MD5 | 1145bab71d9f4d1c2dcc6fc8703d5705
Packet Fence 7.4.0
Posted Jan 26, 2018
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: New database access layer (DAL) for upcoming multi-tenancy support. New portal module to permanently set roles. Added portal module for selecting a role for the device being registered on the portal. Various other updates and enhancements.
tags | tool, remote
systems | unix
MD5 | d365a869a5195892e7e2423efd773e46
Evilgrade - The Update Exploitation Framework 2.0.9
Posted Jan 25, 2018
Authored by Francisco Amato | Site infobyte.com.ar

Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates. This framework comes into play when the attacker is able to make traffic redirection, and such thing can be done in several ways such as: DNS tampering, DNS Cache Poisoning, ARP spoofing Wi-Fi Access Point impersonation, DHCP hijacking with your favorite tools. This way you can easy take control of a fully patched machine during a penetration test in a clean and easy way. The main idea behind the is to show the amount of trivial errors in the update process of mainstream applications.

Changes: Adding aheader support and a new SoapUI module.
tags | tool, spoof
systems | unix
MD5 | 9d0ef1ad41141f40f9308b28d932887d
Chameleon Mini Smartcard Emulator Iceman Fork Rebooted Green GUI 1.0
Posted Jan 24, 2018
Authored by Christian Herrmann | Site github.com

This is the first version of a mostly working firmware for the ChameleonMini RevE rebooted device. It compiles without errors or warnings and gives you more or less the same functionality as the stock firmware. This version compiles and gives you the same functionality (and more) as the original Chameleon Mini rebooted GUI.

tags | tool
systems | unix
MD5 | 602c1370eecc0356ef36c23dcd2b9004
Chameleon Mini Smartcard Emulator Iceman Fork 1.0
Posted Jan 19, 2018
Authored by Christian Herrmann | Site github.com

This is the first version of a mostly working firmware for the ChameleonMini RevE rebooted device. It compiles without errors or warnings and gives you more or less the same functionality as the stock firmware. This release is fully compatible with the GUI software that is bundled with the device upon purchase.

tags | tool
systems | unix
MD5 | e9055dffce99d4c584c0f6b85fe00642
Chameleon Mini Smartcard Emulator Iceman Fork
Posted Nov 27, 2017
Authored by Christian Herrmann | Site github.com

This is the Iceman fork of the Chameleon Mini source code for the firmware. The Chameleon Mini is a versatile contactless smartcard emulator compliant to NFC. A popular hardware revision is the Chameleon Mini rev E - rebooted.

tags | tool
systems | unix
MD5 | ee923f569a98d7b0c1affe7cb8b4651b
AIEngine 1.8.2
Posted Nov 25, 2017
Authored by Luis Campo Giralte | Site bitbucket.org

AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.

Changes: Fixed issue with HTTP Payloads. Added anomaly for long emails on SMTP. Various other updates.
tags | tool
systems | unix
MD5 | 6632355e078f02d22f1a81a500238e90
Haveged 1.9.2
Posted Nov 17, 2017
Site issihosts.com

haveged is a daemon that feeds the /dev/random pool on Linux using an adaptation of the HArdware Volatile Entropy Gathering and Expansion algorithm invented at IRISA. The algorithm is self-tuning on machines with cpuid support, and has been tested in both 32-bit and 64-bit environments. The tarball uses the GNU build mechanism, and includes self test targets and a spec file for those who want to build an RPM.

Changes: Added cross compile fixes contributed by Robert Schwebel. Limited watermark max to less than pool size to avoid 100% cpu condition. Added service.suse init script.
tags | tool
systems | linux, unix
MD5 | fb1d8b3dcbb9d06b30eccd8aa500fd31
I2P 0.9.32
Posted Nov 14, 2017
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: This release contains a number of fixes in the router console and associated webapps (addressbook, i2psnark, and susimail). Various updates and bug fixes.
tags | tool
systems | unix
MD5 | d11d9f9cc9927dddc9d2089a1aaaeb80
Linux Soft Exploit Suggester 0.6
Posted Nov 6, 2017
Authored by Belane | Site github.com

linux-soft-exploit-suggester finds exploits for all vulnerable software in a system helping with the privilege escalation. It focuses on software packages instead of Kernel vulnerabilities.

tags | tool, kernel, vulnerability
systems | linux, unix
MD5 | b248537a3fb85ecece3d4a20f333b5d7
Page 1 of 41
Back12345Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

Recent News

News RSS Feed
Google Expands Bug Bounty To Include Fraud Protection Bypass
Posted Aug 16, 2018

tags | headline, fraud, flaw, google
Credit Card Skimmers Now Need To Fear The Reaper
Posted Aug 16, 2018

tags | headline, hacker, bank, cybercrime, fraud, conference
The Hackers Hunting Down Missing People
Posted Aug 16, 2018

tags | headline, hacker, privacy, conference
President Trump Relaxes US Cyber-Attack Rules
Posted Aug 16, 2018

tags | headline, government, usa, cyberwar, fbi, nsa, cia
Mystery Russian Satellite's Behavior Raises Alarm In US
Posted Aug 15, 2018

tags | headline, usa, russia, space, cyberwar, spyware
Adobe Fixes Critical Code Execution Flaws In Latest Patch Update
Posted Aug 15, 2018

tags | headline, flaw, adobe, patch
Instagram Hack Is Locking Hundreds Of Users Out Of Their Accounts
Posted Aug 15, 2018

tags | headline, hacker, denial of service, password, facebook
Foreshadow And Intel SGX Software Attestation: The Whole Trust Model Collapses
Posted Aug 15, 2018

tags | headline, flaw, cryptography, intel
Hackers Can Edit Policy Body Cam Footage Without Anybody Noticing
Posted Aug 15, 2018

tags | headline, hacker, government
Google Tracks Users Who Turn Off Location History
Posted Aug 15, 2018

tags | headline, privacy, google, spyware
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close