what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 1,204 RSS Feed

Files

OATH Toolkit 2.6.9
Posted Jul 11, 2023
Site nongnu.org

OATH Toolkit attempts to collect several tools that are useful when deploying technologies related to OATH, such as HOTP one-time passwords. It is a fork of the earlier HOTP Toolkit.

Changes: Improved compatibility with recent libxmlsec. Updated gnulib files, dropping gnulib self-tests.
tags | tool
systems | unix
SHA-256 | 333ac831c8f1a6dbd7feb897339bba453ff34d3b0f4cfaa6b5a20dba55c8e985
I2P 2.3.0
Posted Jul 2, 2023
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Cache stores of multihomed leaseSets when stored from multihome peers and if our local leaseSet is not in the keyspace return the multihome instead. When updating a leaseSet because receiving it as published always make a complete copy of the leaseSet before merging the flags. Rate-Limit lookups.
tags | tool
systems | unix
SHA-256 | a0a8fb08e9c72eaef22f155b9c9aa0ea90fb331d2bbcf76f82649f0b9efe5f5b
OpenDNSSEC 2.1.13
Posted Jun 28, 2023
Site opendnssec.org

OpenDNSSEC is software that manages the security of domain names on the Internet. The project intends to drive adoption of Domain Name System Security Extensions (DNSSEC) to further enhance Internet security.

Changes: Emit warning when using ods-kaspcheck for RFC 5155. Fixed concurrent usage of command line. When using "keep" soa numbering policy mode and the input zone isn't available, change from exponential back-off to retry upon next resign interval and only emit a warning, unless this occurs a second time.
tags | tool
systems | unix
SHA-256 | 76e9358dd242abf9a7359948ab422ce9b34a04150b5af764dae5c214f9041b49
Proxmark3 4.16717 Custom Firmware
Posted Jun 27, 2023
Authored by Christian Herrmann | Site github.com

This is a custom firmware written for the Proxmark3 device. It extends the currently available firmware.

Changes: A new standalone modes, iclass sniffing works better now, legic cash segments do not crash, more options to extract files from dump data, support MIFARE Classic value blocks and overall improvements to text output using colors.
tags | tool
systems | unix
SHA-256 | 675a785e859d600b55de67ecd17a85ff26741d8e1b74c51ed0fa585850b44f3f
AIEngine 2.4.0
Posted Jun 1, 2023
Authored by Luis Campo Giralte | Site bitbucket.org

AIEngine is a next generation interactive/programmable Python/Ruby/Java/Lua and Go network intrusion detection system engine. AIEngine also helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.

Changes: Support natively of nefilter on the PacketDispatcher on linux systems. Allow more flexible API query parameters on the api. Allow to see in real time over the Rest API the L7 payloads of selected flows. Improvements on the TCP QoS metrics.Flow drop packets and bytes now available. Fix an issue with RST and ICMP unreach with network devices. Support for IP on GRE tunnels.
tags | tool, java, python, ruby
systems | unix
SHA-256 | 9592ddac406040974faa1b34a459f123d010fd293a18114a8468d871b7825c7b
I2P 2.2.1
Posted Apr 14, 2023
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Fixed missing Java options in docker/rootfs/startapp.sh. Added fix to detect when running in Podman instead of regular Docker. Updated Tor Browser User-Agent String. Updated local GeoIP database. Removed invalid signing keys from old installs. Updated Tomcat version in Ubuntu Lunar and Debian Sid.
tags | tool
systems | unix
SHA-256 | f53f34fbe23a8762e3786572751b301befb28288efb6b1042d4fc64c6610784f
I2P 2.2.0
Posted Mar 14, 2023
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: This release includes a changes across the NetDB, Floodfill, and Peer-Selection components which improve the ability of the router to survive DDOS attacks. This release also adds replay protection to the Streaming subsystem, which prevents an attacker who can capture an encrypted packet from being able to re-use it by sending it to unintended recipients.
tags | tool
systems | unix
SHA-256 | e4ba06a6e2935a17990f057a72b8d79e452a2556a6cefe5012d5dd63466feebf
Packet Fence 12.2.0
Posted Mar 10, 2023
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: Added support for ContentKeeper firewall SSO. Added support for Unifi OS controllers. Added support for downloadable ACLs on Cisco and Dell switches. Also added were 18 enhancements and 15 bug fixes.
tags | tool, remote
systems | unix
SHA-256 | 251932bf9475949215f9aac4466fa0117ead91a3e4339f6154725c1a48452f81
AIEngine 2.3.0
Posted Feb 20, 2023
Authored by Luis Campo Giralte | Site bitbucket.org

AIEngine is a next generation interactive/programmable Python/Ruby/Java/Lua and Go network intrusion detection system engine. AIEngine also helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.

Changes: Fixed minor issue with DomainNames with * on HTTP and SSL. Now shows the time of the data that is stored internally on FlowManagers and Protocols that has been flushed. Now controls the number of elements that can be shown on the protocols over the API (limit parameter). Now sends IPCs message queue on python callback flows. Improvements made on the DNS protocol with more dns fields.
tags | tool, java, python, ruby
systems | unix
SHA-256 | 65c5483016570ea2fd986c9fd302001786b8924e7bfe294e0bbbd46f415bf974
Proxmark3 4.16191 Custom Firmware
Posted Jan 30, 2023
Authored by Christian Herrmann | Site github.com

This is a custom firmware written for the Proxmark3 device. It extends the currently available firmware.

Changes: Two new standalone modes, improved iso15693 slix commands, and bug fixes.
tags | tool
systems | unix
SHA-256 | cd97f7cdbba3c3d6519ce90cec806a0c72ef39f4aa8861403339b64668b768cd
I2P 2.1.0
Posted Jan 11, 2023
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Various updates.
tags | tool
systems | unix
SHA-256 | 83098c1277204c5569284b32b37ef137656b27bfe15ef903eca2da7c269288d1
Adversary3 3.0
Posted Dec 15, 2022
Authored by malvuln | Site malvuln.com

Adversary3 is a tool to navigate the vast www.malvuln.com malware vulnerability dataset.

Changes: Dozens of new malware vulnerabilities added. New category of Logic Flaw was added.
tags | tool
systems | unix
SHA-256 | 9b13bea6b5b0bded8397b049cc552bc744cf3d67513c8059ab448bf8e9242f5a
Packet Fence 12.1.0
Posted Nov 23, 2022
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: 4 new features, 13 enhancements, and 8 bug fixes.
tags | tool, remote
systems | unix
SHA-256 | 9dff1fc3804cbf841bf0f847969f4742631b53d173555cc82c0e67c0a2e60896
I2P 2.0.0
Posted Nov 22, 2022
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Version 2.0.0 enables SSU2.
tags | tool
systems | unix
SHA-256 | 1d50831e72a8f139cc43d5584c19ca48580d72f1894837689bf644c299df9099
OpenDNSSEC 2.1.12
Posted Nov 11, 2022
Site opendnssec.org

OpenDNSSEC is software that manages the security of domain names on the Internet. The project intends to drive adoption of Domain Name System Security Extensions (DNSSEC) to further enhance Internet security.

Changes: This is a maintenance release of OpenDNSSEC addressing additional issues relating to the previous bug-fix release.
tags | tool
systems | unix
SHA-256 | 50d7b9b0ccfc6a502784606ca4e5c03680fcf6425fb3947f45d8809ea8503e59
Proxmark3 4.15864 Custom Firmware
Posted Oct 31, 2022
Authored by Christian Herrmann | Site github.com

This is a custom firmware written for the Proxmark3 device. It extends the currently available firmware.

Changes: Bug fixes and NDEF support for MIFARE Classic and MIFARE DESFire.
tags | tool
systems | unix
SHA-256 | 0fb778f238813b3b6fbf3bf6901a6699c2e38cee7cf8d65dc8ec5951e65cc0ea
nfstream 6.5.3
Posted Oct 26, 2022
Authored by Zied Aouini | Site github.com

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

Changes: nDPI updated. Implemented max_nflows parameter. Minor example fixes.
tags | tool, python
systems | unix
SHA-256 | 53ba1723a56c77d936eed734e9d420bbb2e0c430ca907e2df09016bc29a0898c
MutableSecurity 0.4.0
Posted Oct 24, 2022
Authored by MutableSecurity | Site mutablesecurity.io

MutableSecurity is a Linux CLI program for making cybersecurity solution management easier and more accessible, from deployment and configuration to monitoring. It supports multiple solutions (teler as web IDS, Fail2ban as host IPS, Let's Encrypt for generating SSL certificates, and ClamAV as antimalware), password-based and key-based SSH authentication, and parallel deployment to multiple remote hosts.

Changes: Adds support for Let's Encrypt x Certbot and ClamAV.
tags | tool, remote, web
systems | linux, unix
SHA-256 | d3847e2b262ecf876f62497edbddf483e0a440a5a45baaabc6a3e5663502e780
monomorph MD5-Monomorphic Shellcode Packer
Posted Sep 29, 2022
Authored by Retr0id | Site github.com

This tool packs up to 4KB of compressed shellcode into an executable binary, near-instantly. The output file will always have the same MD5 hash: 3cebbe60d91ce760409bbe513593e401. Currently, only Linux x86-64 is supported. It would be trivial to port this technique to other platforms, although each version would end up with a different MD5.

tags | tool, x86, shellcode
systems | linux, unix
SHA-256 | 1401bc41094d6c399524f490182dedc77295916d73ec25d4c7ea3751f754d6cc
nfstream 6.5.2
Posted Sep 28, 2022
Authored by Zied Aouini | Site github.com

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

Changes: nDPI update. Windows fixes. Multiple pcap files support. Wheels generation for Alpine, Linux 32bits, aarch64, Apple Silicon.
tags | tool, python
systems | unix
SHA-256 | da5306d28b0076e69391f9795d1074d3ee383e8d2f622006eeab0362afde9021
Packet Fence 12.0.0
Posted Sep 16, 2022
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: 7 new features, 15 enhancements, and 16 bug fixes.
tags | tool, remote
systems | unix
SHA-256 | 58275977606c1d2971491560348e08abe448043ba4cbe4670612a9f7fd02bce0
I2P 1.9.0
Posted Aug 23, 2022
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: A long list of bug fixes and updates listed in history.txt.
tags | tool
systems | unix
SHA-256 | 57f61815098c35593d7ede305f98b9015c4c613c72231ad084e6806a3e2aa371
AIEngine 2.2.0
Posted Jul 21, 2022
Authored by Luis Campo Giralte | Site bitbucket.org

AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.

Changes: Fixed issue with tagging flows and issue with flow identifier on the API. Now shows the current script code over the API. Added parameter class to the help URI. Added Cache-Control header on the API. Improvements on the SSLProtocol. Multiple other updates.
tags | tool
systems | unix
SHA-256 | e51bc7defd4393939e716c60405cf72a4aa1c727b6ccde44784fd235022e5017
Queue Abstract Data Type Tool
Posted Jul 1, 2022
Authored by Raed Ahsan

This tool can be embedded into AI systems for storing information and deleting it very efficiently by using queues disguising themselves as arrays and adding data and removing the data using pointers and flags.

tags | tool
systems | unix
SHA-256 | 8f54b905160a1220ecf3c33ac6bae06583c2c8c8cf9712f69ed5343016f6bbe6
Blue Team Training Toolkit (BT3) 2.9
Posted Jun 30, 2022
Authored by Juan J. Guelfo | Site encripto.no

Blue Team Training Toolkit (BT3) is an attempt to introduce improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. The Blue Team Training Toolkit is written in Python, and it includes the latest versions of Encripto's Maligno and Pcapteller.

Changes: This is a final release with offline mode only. The BT3 API is now deprecated. The BT3 content library is available for download for offline use.
tags | tool, python
systems | unix
SHA-256 | 39b24206653dbb67f70c0b9529ff7524fecc1226fe682a0fc729b46dba16a034
Page 2 of 49
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
US Senators Propose Law To Require Bare Minimum Security Standards
Posted Nov 27, 2024

tags | headline, government, usa, password
Telco Engineer Who Spied On Employer For Beijing Gets 4 Years
Posted Nov 27, 2024

tags | headline, government, privacy, usa, phone, china, cyberwar, spyware, voip
New York Fines GEICO And Travelers $11.3 Million In Data Breach Cases
Posted Nov 27, 2024

tags | headline, hacker, government, privacy, usa, data loss
ProjectSend Vulnerability Exploited In The Wild
Posted Nov 27, 2024

tags | headline, hacker, flaw
CyberVolk Analysis Explores Ransomware, Hacktivism Connections
Posted Nov 27, 2024

tags | headline, hacker, malware, russia, cybercrime, cryptography
Russian Cyberspies Hacked Building Across Street From Target For W-Fi Attack
Posted Nov 25, 2024

tags | headline, hacker, government, russia, wireless, spyware
Cyberattacks Cost British Businesses $55 Billion In Past 5 Years
Posted Nov 25, 2024

tags | headline, malware, britain, cybercrime, fraud, cryptography
How The ZX Spectrum Became A 1980s Icon
Posted Nov 25, 2024

tags | headline, science
China Has Pwned Thousands And Thousands Of Telco Devices
Posted Nov 25, 2024

tags | headline, government, privacy, usa, china, cyberwar, spyware
Here's What Happens If You Don't Layer Network Security Or Remove Unused Web Shells
Posted Nov 22, 2024

tags | headline, government, privacy, cybercrime, data loss, japan
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close