exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 176 - 200 of 1,204 RSS Feed

Files

PHPGGC unserialize() Payload Tool
Posted Apr 2, 2019
Site ambionics.io

PHPGGC is a library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.

tags | tool, php
systems | unix
SHA-256 | 93181be3652f19677819717aaa1571c1ec8fb4fc160d89b9ec58e184e09d8c6b
I2P 0.9.39
Posted Mar 22, 2019
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Performance improvements. Various other updates.
tags | tool
systems | unix
SHA-256 | 105773e11481cfcea0bc69b932895890ba5dd5e8d59ec322f06743bf2f15d211
I2P 0.9.38
Posted Jan 23, 2019
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Added source param to javadoc target. Updated translations. Various other updates.
tags | tool
systems | unix
SHA-256 | 65fe327fdd11272a764c9e1c6ae1f38b151cea9003216b861c7ff2b281ca2970
Hodorsec Linux Binary Encryption Utility
Posted Jan 10, 2019
Authored by Hodorsec

This archive contains a Linux x86/x64 payload AES-128 CBC encrypter and payload decrypter/runner.

tags | tool, x86
systems | linux, unix
SHA-256 | 456de0042812f5a98189859583df3dd73d9d360ecc37ccc72ee879753d9ca583
Packet Fence 8.3.0
Posted Jan 10, 2019
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: Added support for Juniper EX2300 (JUNOS 18.2) switches. Added a random algorithm for VLAN pooling. Added the ability to reserve IP addresses in pfdhcp. Added a way to trigger a violation when device profiling detects a change in the device class. Various other additions.
tags | tool, remote
systems | unix
SHA-256 | 91699fd190021fe97d2763a34db487835e9be82fbd7d493e9d4912061c7e54c6
Chameleon Mini Smartcard Emulator Iceman Fork Rebooted Yellow GUI 1.2
Posted Dec 17, 2018
Authored by Christian Herrmann | Site github.com

Firmware for the ChameleonMini RevE rebooted device. It compiles without errors or warnings and gives you more or less the same functionality as the stock firmware. This version compiles and gives you the same functionality (and more) as the original Chameleon Mini rebooted GUI.

Changes: Added support for devices with RevG FW. Added support for new JSON dump format used with proxmark3. Added support for EML dump format. Added support for MCT dump format from MifareClassicTool (MCT). Changed mfkey attack implementation to a pure managed code version. More languages supported (dutch, french, german). More templates supported (iClass dark template).
tags | tool
systems | unix
SHA-256 | 081f58534e22ebbcc9fc65593786c993f2f9b5fd1ed220cfdf87615be250bf31
Packet Fence 8.2.1
Posted Dec 6, 2018
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: Allows for SMS PIN codes to be reused. Various bug fixes.
tags | tool, remote
systems | unix
SHA-256 | 370dc0822fbf803a731e474a43b9f74a5461d77986f3feb416789bb5d6c2edfc
Apkatshu 1.0
Posted Nov 15, 2018
Authored by Abdeljalil Nouiri

Apkatshu is a tool for for extracting urls, emails, ip addresses, and interesting data from APK files. The user can choose either JADX or APKTOOL for de-compilation.

tags | tool
systems | unix
SHA-256 | 0a16eb2df6020b32b626ac9e2fa4521f69687f1d9436abc2e30d5674e1abd5f4
Packet Fence 8.2.0
Posted Nov 9, 2018
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: Added support for clusters with servers located in multiple layer 3 networks. Permitted incoming Eduroam TLRS RADIUS requests. Added Mojo web authentication support. Added SMTP test function in Alerting. Various other additions and updates.
tags | tool, remote
systems | unix
SHA-256 | 97f539eeb90b8cb653fc9dbd151af722eba19f53c751aec16dc2d94f55258007
I2P 0.9.37
Posted Oct 8, 2018
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Various updates.
tags | tool
systems | unix
SHA-256 | 0c3736572182519f4831201c72609f069229a2cc73d29ca135417c143061a18d
Blue Team Training Toolkit (BT3) 2.8
Posted Sep 5, 2018
Authored by Juan J. Guelfo | Site encripto.no

Blue Team Training Toolkit (BT3) is an attempt to introduce improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. The Blue Team Training Toolkit is written in Python, and it includes the latest versions of Encripto's Maligno and Pcapteller.

Changes: SSL_TRUST option has been included in Maligno. Bug fixes and minor adjustments.
tags | tool, python
systems | unix
SHA-256 | d866f802f90d64cc210b3fe3eb026edae763c251f273321540a8e6aaab2310d1
Haveged 1.9.4
Posted Aug 27, 2018
Site issihosts.com

haveged is a daemon that feeds the /dev/random pool on Linux using an adaptation of the HArdware Volatile Entropy Gathering and Expansion algorithm invented at IRISA. The algorithm is self-tuning on machines with cpuid support, and has been tested in both 32-bit and 64-bit environments. The tarball uses the GNU build mechanism, and includes self test targets and a spec file for those who want to build an RPM.

Changes: Added a fix to avoid misleading message if cmd socket is in use.
tags | tool
systems | linux, unix
SHA-256 | c4959d3cb1fa6391d16a3aa1ba4d82cd3a0d497206ae4b87d638088c0664e5aa
I2P 0.9.36
Posted Aug 24, 2018
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Updated translations. Removed unused stream methods from I2NP. Various other updates.
tags | tool
systems | unix
SHA-256 | 148c0f86f000d833901e7182797f6fb6470c1b600344056c710e326789d0fd54
Packet Fence 8.1.0
Posted Jul 11, 2018
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: Added support for dynamic PSK (Cisco IPSK) for the Cisco WLC and hostapd. Added Ubiquiti Unifi web authentication and 802.1X support. Added support for Cambium AP module for 802.1X, MAC and web authentication. Various other additions and updates.
tags | tool, remote
systems | unix
SHA-256 | ef569376dbacd8bce18c6b0335a0251083a0da8a8e338934489e493985fe1afb
I2P 0.9.35
Posted Jun 26, 2018
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: This version includes SusiMail folders and SSL Wizard.
tags | tool
systems | unix
SHA-256 | 8bb88d3db355ebfa5be65d48089db60919875ac298b7217b7f8150048ea5079e
msploitego 1.0
Posted Jun 14, 2018
Authored by Marc Gurreri | Site github.com

msploitego is the pentesting suite for Maltego. msploitego leverages the data gathered in a Metasploit database by enumerating and creating specific entities for services. Services like samba, smtp, snmp, http have transforms to enumerate even further.

tags | tool, web
systems | unix
SHA-256 | 8e49a427b89e77829f637050b63b7f3b4b807da701532e1a03fa3df59ba6be22
AIEngine 1.9.0
Posted Jun 10, 2018
Authored by Luis Campo Giralte | Site bitbucket.org

AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.

Changes: Fixed an issue on SSL issuer certificate. Improvements on SSL for support TLS 1.3 Various other updates.
tags | tool
systems | unix
SHA-256 | c2b01d0e3510ed5d6b26ef78d97e4706bafd03ca1ab074468b36965c15f50951
m4ngl3m3! 0.1 Password Generator
Posted Jun 10, 2018
Authored by localh0t

m4ngl3m3! version 0.1 is a common password pattern generator using a strings list.

tags | tool
systems | unix
SHA-256 | 965b0a92d18fbe43a89c4d10a71810ecbcc60e76fc0d5e64d2b3f165c7409ee0
Blue Team Training Toolkit (BT3) 2.7
Posted May 16, 2018
Authored by Juan J. Guelfo | Site encripto.no

Blue Team Training Toolkit (BT3) is an attempt to introduce improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. The Blue Team Training Toolkit is written in Python, and it includes the latest versions of Encripto's Maligno and Pcapteller.

Changes: This release introduces an improved BT3 API account registration process, support for Ubuntu 18.04 LTS, and other minor adjustments.
tags | tool, python
systems | unix
SHA-256 | d65010874489d225c3085afcb787f78f9d1021517611e74b4c0c5f2a43ca639c
rldns 1.2
Posted May 11, 2018
Authored by Ringlayer | Site ringlayer.net

rldns is an open source lightweight DNS server for linux, netbsd, freebsd, and openbsd. Runs on x86 and x86_64 architectures.

Changes: Various updates.
tags | tool, x86
systems | linux, netbsd, unix, freebsd, bsd, openbsd
SHA-256 | 3ef0107cfa51f2818c05a51cce9b22d87404ba178c87f4441cf3b73f5957e175
Packet Fence 8.0.1
Posted May 11, 2018
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: Updated the computername (hostname) of a node using the Fingerbank Collector data. Detects uplinks based on CDP flag instead of a string. Puts etcd in its own directory. Various other updates.
tags | tool, remote
systems | unix
SHA-256 | 8fb9ac2f477dcfda1a39263061545a6eec9f82527ce56a9205b8137e23099f56
Packet Fence 8.0.0
Posted Apr 27, 2018
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: Replaced the ISC DHCP server with a new Golang-based DHCP server. Now supporting inline enforcement in active/active clusters. Replaced pfdns with a new Golang-based DNS server. Various other updates.
tags | tool, remote
systems | unix
SHA-256 | c369bd8139eb3244e06e4110b08d66b5e6c43026b92006e94caf85487d820b56
Linux Exploit Suggester 0.9
Posted Apr 24, 2018
Authored by mzet

Linux Exploit Suggester is a tool to help identify possible privilege escalation attack vectors on target Linux machine by suggesting possible exploits.

tags | tool
systems | linux, unix
SHA-256 | 50d4b7a354eb250d845ddf3659cfe41e11187244ddd5f41048be936386b06878
I2P 0.9.34
Posted Apr 11, 2018
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Various updates and bug fixes.
tags | tool
systems | unix
SHA-256 | 30a2cd843e379c2e0d1b3f917ef4e98ea967f3759b81fcb7e0fe47f509aed813
Chameleon Mini Smartcard Emulator Iceman Fork Rebooted Blue GUI 1.1
Posted Apr 2, 2018
Authored by Christian Herrmann | Site github.com

This is a mostly working firmware for the ChameleonMini RevE rebooted device. It compiles without errors or warnings and gives you more or less the same functionality as the stock firmware. This version compiles and gives you the same functionality (and more) as the original Chameleon Mini rebooted GUI.

Changes: Multiple new features added including user-friendly dump file management and improved GUI layout.
tags | tool
systems | unix
SHA-256 | fc5f907db7dcd23c2e6445c581a2f27b7cef8a195847fe0d6c060e93892e6cc0
Page 8 of 49
Back678910Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Zabbix Urges Upgrades After Critical SQL Injection Bug Disclosure
Posted Dec 2, 2024

tags | headline, flaw, patch
Starbucks, Grocery Stores Hit By Blue Yonder Ransomware Attack
Posted Dec 2, 2024

tags | headline, malware, cryptography
US Senators Propose Law To Require Bare Minimum Security Standards
Posted Nov 27, 2024

tags | headline, government, usa, password
Telco Engineer Who Spied On Employer For Beijing Gets 4 Years
Posted Nov 27, 2024

tags | headline, government, privacy, usa, phone, china, cyberwar, spyware, voip
New York Fines GEICO And Travelers $11.3 Million In Data Breach Cases
Posted Nov 27, 2024

tags | headline, hacker, government, privacy, usa, data loss
Russian APT Chained Firefox and Windows Zero-Days Against US and European Targets
Posted Nov 27, 2024

tags | headline, malware, microsoft, russia, flaw, mozilla, firefox, zero day
Feds Seek To Grill Kansas City Man With Hacking Charges
Posted Nov 27, 2024

tags | headline, hacker, government, usa
ProjectSend Vulnerability Exploited In The Wild
Posted Nov 27, 2024

tags | headline, hacker, flaw
Source Code Of macOS Banshee Stealer Leaked
Posted Nov 27, 2024

tags | headline, malware, russia, data loss, apple
CyberVolk Analysis Explores Ransomware, Hacktivism Connections
Posted Nov 27, 2024

tags | headline, hacker, malware, russia, cybercrime, cryptography
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close