exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 151 - 175 of 1,204 RSS Feed

Files

I2P 0.9.45
Posted Feb 27, 2020
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Various bug fixes.
tags | tool
systems | unix
SHA-256 | e65c7dbbf464b6bc64afb228306fbfed0f1e67ffec74f96852b82acade53921c
nfstream 3.2.0
Posted Feb 20, 2020
Authored by Zied Aouini | Site github.com

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

Changes: Added nDPI 3.2 support. Fixed metadata extraction issues.
tags | tool, python
systems | unix
SHA-256 | 12011eb0e4798ce4039defc10498c4ae9af7f4edf7731e9d32f4d8ae678cda66
OpenDNSSEC 2.1.6
Posted Feb 18, 2020
Site opendnssec.org

OpenDNSSEC is software that manages the security of domain names on the Internet. The project intends to drive adoption of Domain Name System Security Extensions (DNSSEC) to further enhance Internet security.

Changes: Various bug fixes including missing signatures and a memory leak.
tags | tool
systems | unix
SHA-256 | b2c0caa673b8cfef73585dedf276997f5ca69bb3d523ce4e080f70dfcb23c56c
nfstream 3.1.2
Posted Feb 5, 2020
Authored by Zied Aouini | Site github.com

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

Changes: Fixed test workflows. Updated nDPI.
tags | tool, python
systems | unix
SHA-256 | 276e62b019d9ddf89b56b83251e72160914945f874193e34854919443ee42e62
Packet Fence 9.3.0
Posted Jan 14, 2020
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: Massively improved web admin performance. Fixed eduroam load-balancing issue on local realm. Various other improvements.
tags | tool, remote
systems | unix
SHA-256 | d35ea155a6c94161743e443b6727e8115d4238a5f423584fbeea100c0b01007b
DroneSploit Black Hat Europe 2019 Release
Posted Dec 9, 2019
Authored by Yannick Pasquazzo, Alexandre D'Hondt | Site github.com

DroneSploit is a CLI framework that is based on sploitkit and is an attempt to gather hacking techniques and exploits especially focused on drone hacking. For the ease of use, the interface has a layout that looks like Metasploit.

tags | tool
systems | unix
SHA-256 | e9407802c5eb2663abbd331a19ad61a8c3b344cea5117e83f5a8fdd76aec0d1b
I2P 0.9.44
Posted Dec 2, 2019
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Various bug fixes.
tags | tool
systems | unix
SHA-256 | 9f03a636e2dc7e25455fb75869b3a8313fd177d231e056b0556159efec4d6d9d
Packet Fence 9.2.0
Posted Nov 27, 2019
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: Now allows to force the access duration when using device registration. Added audit log for API and new admin interface. Added configuration based switch modules. Various other additions.
tags | tool, remote
systems | unix
SHA-256 | c8f8b030751ee35087e8fa264cc37a0d325186c0e8e6eee9eed0686115ddc0a4
Kamerka 2.0
Posted Nov 15, 2019
Authored by woj-ciech

Kamerka is an OSINT tool that builds an interactive map of cameras, printers, tweets, and photos leveraging Flickr, Instagram, Shodan, and Twitter.

tags | tool
systems | unix
SHA-256 | 88a3fe6de6a1c3017fe9a78646ade0fa944a4da08f3a6ef686ccd4fc0f5c708a
AIEngine 1.9.1
Posted Nov 6, 2019
Authored by Luis Campo Giralte | Site bitbucket.org

AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.

Changes: Added support for retrieve client and server banners from SSH and also JA3 signatures. Various other updates.
tags | tool
systems | unix
SHA-256 | 1ed6c756896c0be7d6f02221415577553b63cab0230b83ec49e64f936722fd08
Bluto 2.4.16
Posted Nov 6, 2019
Authored by Darryl Lane | Site github.com

Bluto is a dns reconnaissance, vulnerability checking, and enumeration tool.

Changes: Bluto has gone through a large code base change and various feature additions have been added.
tags | tool
systems | unix
SHA-256 | bd23c98b29e17e317f7e3e6153119fe5ba60704f2151c5ea45848d0295b35100
I2P 0.9.43
Posted Oct 24, 2019
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Console setup wizard improvements. Tunnel wizard simplification. New I2CP BlindingInfo message for LS2. New proxy page to enter encrypted leaseset credentials. Various bug fixes.
tags | tool
systems | unix
SHA-256 | beb2a3c62efce826cd5aa3e296b483143ad2c581ddb038677f960f7d110df81c
PDFGrab 0.4.4
Posted Oct 2, 2019
Authored by dash | Site github.com

pdfgrab is a python script that analyzes pdf files to extract their metadata. You can direct it to analyze a single file, a directory of pdfs, provide it a url, or have it leverage googlesearch to get pdfs at a target site.

tags | tool, python
systems | unix
SHA-256 | 5e841351d8cb8474ca2839e782345991ee0667a8cbfcc161744405cb18cb4aa6
Haveged 1.9.8
Posted Oct 1, 2019
Site issihosts.com

haveged is a daemon that feeds the /dev/random pool on Linux using an adaptation of the HArdware Volatile Entropy Gathering and Expansion algorithm invented at IRISA. The algorithm is self-tuning on machines with cpuid support, and has been tested in both 32-bit and 64-bit environments. The tarball uses the GNU build mechanism, and includes self test targets and a spec file for those who want to build an RPM.

Changes: Fix for Unresolved symbol error_exit in libhavege. Various other updates.
tags | tool
systems | linux, unix
SHA-256 | 99aa1996c6e39ea2459cfc37addfb8b1eecc63f3a2b6da9db17b22e76b6851ae
Packet Fence 9.1.0
Posted Sep 18, 2019
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: New features include network visualization, a new way to forward Eduroam local realm to a specific RADIUS server, and a new DNS auditing log module. Various other additions.
tags | tool, remote
systems | unix
SHA-256 | 0baf896b8aba4fe649938d1f6dfe262c198bdc07c0d3301256cbf8da00ae4358
I2P 0.9.42
Posted Aug 28, 2019
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Bug fix release.
tags | tool
systems | unix
SHA-256 | 30482b56becb6135ed4b74bd4715906774f7c3f3302753985a5fde363f0cc713
Haveged 1.9.6
Posted Aug 26, 2019
Site issihosts.com

haveged is a daemon that feeds the /dev/random pool on Linux using an adaptation of the HArdware Volatile Entropy Gathering and Expansion algorithm invented at IRISA. The algorithm is self-tuning on machines with cpuid support, and has been tested in both 32-bit and 64-bit environments. The tarball uses the GNU build mechanism, and includes self test targets and a spec file for those who want to build an RPM.

Changes: Various bug fixes.
tags | tool
systems | linux, unix
SHA-256 | 4d4c046755476d3734ffb78772c242c25913ff0eb7509c143671dae6ec9d1189
Haveged 1.9.5 Alpha
Posted Aug 20, 2019
Site issihosts.com

haveged is a daemon that feeds the /dev/random pool on Linux using an adaptation of the HArdware Volatile Entropy Gathering and Expansion algorithm invented at IRISA. The algorithm is self-tuning on machines with cpuid support, and has been tested in both 32-bit and 64-bit environments. The tarball uses the GNU build mechanism, and includes self test targets and a spec file for those who want to build an RPM.

Changes: This is an alpha pre-release. Added test for /dev/random symlink. Updated to automake 1.16. Various other updates.
tags | tool
systems | linux, unix
SHA-256 | 9ac75039584f5af216d1ce97fead75f2e852bf2d3665e58d66b3da184ace7deb
pArAnoIA Browser 0.1
Posted Jul 11, 2019
Authored by psy | Site browser.03c8.net

pArAnoIA is a toolkit designed to surf the Internet. It's a browser with TOR built-in, spoofing of user-agent and other functions, ensures strict use of TLS, and more.

tags | tool, spoof
systems | unix
SHA-256 | 596622ec5b79835e726ea3ff21e328cb6819844cbbabb00d251f03e228303316
I2P 0.9.41
Posted Jul 4, 2019
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Bug fix release.
tags | tool
systems | unix
SHA-256 | f988877940b2cff1a90534c47b78343de49cd6290817edb57c0142eecf1d164e
Packet Fence 9.0.1
Posted May 28, 2019
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: Improved display of RADIUS audit log from RADIUS tab. Added -copy to the ID when cloning a configuration resource. Various other additions.
tags | tool, remote
systems | unix
SHA-256 | a2cc1e393db460c66f6b0df1d5ec8d1078b860cdc1c3397b61edea338fd1be47
OpenDNSSEC 2.1.4
Posted May 17, 2019
Site opendnssec.org

OpenDNSSEC is software that manages the security of domain names on the Internet. The project intends to drive adoption of Domain Name System Security Extensions (DNSSEC) to further enhance Internet security.

Changes: Various bug fixes.
tags | tool
systems | unix
SHA-256 | 77e85e417d1067a5e4529b636248875a9e2d1925d5e90f022449007e59d6a293
Packet Fence 9.0.0
Posted May 16, 2019
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: New web interface based on Vue.js and Bootstrap 4. Let's Encrypt SSL certificates support for captive portal and RADIUS. Various other additions.
tags | tool, remote
systems | unix
SHA-256 | 73a5f3314e76bbeae60fd81a597c7d737d14fe8bab845072bf6586fe93d12a53
I2P 0.9.40
Posted May 7, 2019
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: New icons. Various other updates.
tags | tool
systems | unix
SHA-256 | 5d31e0a324dfe429135ac17595b3cab3e81d85d4aa7a720db402dec47bfeda23
Lets Map Your Network
Posted May 6, 2019
Authored by Pramod Rana | Site github.com

Lets Map Your Network is a framework that enables you to visualize your physical network in form graph and look for anomalous changes.

tags | tool
systems | unix
SHA-256 | 890cba8fc34f8219427fa4039d5112681ff1068aa13b095b320e7f698a79e84b
Page 7 of 49
Back56789Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Zabbix Urges Upgrades After Critical SQL Injection Bug Disclosure
Posted Dec 2, 2024

tags | headline, flaw, patch
Starbucks, Grocery Stores Hit By Blue Yonder Ransomware Attack
Posted Dec 2, 2024

tags | headline, malware, cryptography
US Senators Propose Law To Require Bare Minimum Security Standards
Posted Nov 27, 2024

tags | headline, government, usa, password
Telco Engineer Who Spied On Employer For Beijing Gets 4 Years
Posted Nov 27, 2024

tags | headline, government, privacy, usa, phone, china, cyberwar, spyware, voip
New York Fines GEICO And Travelers $11.3 Million In Data Breach Cases
Posted Nov 27, 2024

tags | headline, hacker, government, privacy, usa, data loss
Russian APT Chained Firefox and Windows Zero-Days Against US and European Targets
Posted Nov 27, 2024

tags | headline, malware, microsoft, russia, flaw, mozilla, firefox, zero day
Feds Seek To Grill Kansas City Man With Hacking Charges
Posted Nov 27, 2024

tags | headline, hacker, government, usa
ProjectSend Vulnerability Exploited In The Wild
Posted Nov 27, 2024

tags | headline, hacker, flaw
Source Code Of macOS Banshee Stealer Leaked
Posted Nov 27, 2024

tags | headline, malware, russia, data loss, apple
CyberVolk Analysis Explores Ransomware, Hacktivism Connections
Posted Nov 27, 2024

tags | headline, hacker, malware, russia, cybercrime, cryptography
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close