PHPGGC is a library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.
93181be3652f19677819717aaa1571c1ec8fb4fc160d89b9ec58e184e09d8c6b
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.
105773e11481cfcea0bc69b932895890ba5dd5e8d59ec322f06743bf2f15d211
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.
65fe327fdd11272a764c9e1c6ae1f38b151cea9003216b861c7ff2b281ca2970
This archive contains a Linux x86/x64 payload AES-128 CBC encrypter and payload decrypter/runner.
456de0042812f5a98189859583df3dd73d9d360ecc37ccc72ee879753d9ca583
PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.
91699fd190021fe97d2763a34db487835e9be82fbd7d493e9d4912061c7e54c6
Firmware for the ChameleonMini RevE rebooted device. It compiles without errors or warnings and gives you more or less the same functionality as the stock firmware. This version compiles and gives you the same functionality (and more) as the original Chameleon Mini rebooted GUI.
081f58534e22ebbcc9fc65593786c993f2f9b5fd1ed220cfdf87615be250bf31
PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.
370dc0822fbf803a731e474a43b9f74a5461d77986f3feb416789bb5d6c2edfc
Apkatshu is a tool for for extracting urls, emails, ip addresses, and interesting data from APK files. The user can choose either JADX or APKTOOL for de-compilation.
0a16eb2df6020b32b626ac9e2fa4521f69687f1d9436abc2e30d5674e1abd5f4
PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.
97f539eeb90b8cb653fc9dbd151af722eba19f53c751aec16dc2d94f55258007
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.
0c3736572182519f4831201c72609f069229a2cc73d29ca135417c143061a18d
Blue Team Training Toolkit (BT3) is an attempt to introduce improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. The Blue Team Training Toolkit is written in Python, and it includes the latest versions of Encripto's Maligno and Pcapteller.
d866f802f90d64cc210b3fe3eb026edae763c251f273321540a8e6aaab2310d1
haveged is a daemon that feeds the /dev/random pool on Linux using an adaptation of the HArdware Volatile Entropy Gathering and Expansion algorithm invented at IRISA. The algorithm is self-tuning on machines with cpuid support, and has been tested in both 32-bit and 64-bit environments. The tarball uses the GNU build mechanism, and includes self test targets and a spec file for those who want to build an RPM.
c4959d3cb1fa6391d16a3aa1ba4d82cd3a0d497206ae4b87d638088c0664e5aa
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.
148c0f86f000d833901e7182797f6fb6470c1b600344056c710e326789d0fd54
PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.
ef569376dbacd8bce18c6b0335a0251083a0da8a8e338934489e493985fe1afb
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.
8bb88d3db355ebfa5be65d48089db60919875ac298b7217b7f8150048ea5079e
msploitego is the pentesting suite for Maltego. msploitego leverages the data gathered in a Metasploit database by enumerating and creating specific entities for services. Services like samba, smtp, snmp, http have transforms to enumerate even further.
8e49a427b89e77829f637050b63b7f3b4b807da701532e1a03fa3df59ba6be22
AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.
c2b01d0e3510ed5d6b26ef78d97e4706bafd03ca1ab074468b36965c15f50951
m4ngl3m3! version 0.1 is a common password pattern generator using a strings list.
965b0a92d18fbe43a89c4d10a71810ecbcc60e76fc0d5e64d2b3f165c7409ee0
Blue Team Training Toolkit (BT3) is an attempt to introduce improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. The Blue Team Training Toolkit is written in Python, and it includes the latest versions of Encripto's Maligno and Pcapteller.
d65010874489d225c3085afcb787f78f9d1021517611e74b4c0c5f2a43ca639c
rldns is an open source lightweight DNS server for linux, netbsd, freebsd, and openbsd. Runs on x86 and x86_64 architectures.
3ef0107cfa51f2818c05a51cce9b22d87404ba178c87f4441cf3b73f5957e175
PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.
8fb9ac2f477dcfda1a39263061545a6eec9f82527ce56a9205b8137e23099f56
PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.
c369bd8139eb3244e06e4110b08d66b5e6c43026b92006e94caf85487d820b56
Linux Exploit Suggester is a tool to help identify possible privilege escalation attack vectors on target Linux machine by suggesting possible exploits.
50d4b7a354eb250d845ddf3659cfe41e11187244ddd5f41048be936386b06878
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.
30a2cd843e379c2e0d1b3f917ef4e98ea967f3759b81fcb7e0fe47f509aed813
This is a mostly working firmware for the ChameleonMini RevE rebooted device. It compiles without errors or warnings and gives you more or less the same functionality as the stock firmware. This version compiles and gives you the same functionality (and more) as the original Chameleon Mini rebooted GUI.
fc5f907db7dcd23c2e6445c581a2f27b7cef8a195847fe0d6c060e93892e6cc0