MailSecRep adds an Outlook button to analyze email for spoofing, hostile links, and malware attachments.
ebf7adf8f19f92735060cb03fa16818cfec6fb47856cd6457d21837df76b598a
Tinycrypt.asm is a training ransomware virus that is fully configurable to your needs but it is designed to be very controllable. It was designed to be used with the PoShFoTo incident response toolkit.
d69c41d85e494c771d84d2ee2805586148307dc2162ea290443e61ae27b7d432
PoShFoTo is the PowerShell Forensics Toolkit, which contains a dozen PowerShell tools that allow you to do basic incident response and malware forensics. It includes Hex Dumper, Registry timeline generator, File timeline generator, and PE-block analyzer.
2516e4a082ce0e53db6d6ba8ddfba777505de06d31bfefcccdabcff2c0057a2b
DA-WIN, a wireless IDS, provides an organization a continuous wireless scanning capability that is light touch and simple. It utilizes compact and discreet sensors that can easily be deployed reducing the total cost of protection and simplifying the effort required for absolute, categoric regulatory compliance. This archive includes a dd image to be used on a Raspberry Pi and a user manual.
eec29a64f031854e639f5edda7e65d034b41f755867195fb575def106ccf5112
DA-WIN, a wireless IDS, provides an organization a continuous wireless scanning capability that is light touch and simple. It utilizes compact and discreet sensors that can easily be deployed reducing the total cost of protection and simplifying the effort required for absolute, categoric regulatory compliance. This archive includes a dd image to be used on a Raspberry Pi and a user manual.
900a69552ae4f2e1b99cd5231bc485c4e70297254407c0b371ac96a0d19853b9
NTP_SPQUERY.C is a spoofed "monlist query" program which can generate packets like those used in reflected amplification NTP attacks that were common in early 2014. Written entirely in C, it requires no special libs or header files. It has been designed to run on most LINUXs.
b2921a12ef46feaba746bf166e1ad786a8a6d84e3174834a115c9770328ac219
dns_spquery.c is written in C and sends a DNS recursive name query to a name server of your choice with a spoofed source IP address selected at runtime. This tool was written in order to demonstrate a DNS reflection / amplification attack for testing purposes.
ee5f524a0cc4f2a2315ce105359420522610fbfdd31f128381a65dfc971bbaca
Obeseus is a light-weight, high-speed ip DDOS detector that has been designed to run on an Intel probe running an advanced 10 Gb/s FPGA card. It detects TCP floods, Fragment Floods, raw ICMP/TCP/UDP, reflected (DNS / SMURF) and BOGON misuse. It also detects application misuse in HTTP and UDP.
874b8fa0bc6bc615a63f6ed39567f07ad521a790408f16ea34c9f9f982b496c2
Obeseus is a light-weight, high-speed ip DDOS detector that has been designed to run on an Intel probe running an advanced 10 Gb/s FPGA card. Firmware Routines on the card ensure that the attack is identified right down to host/port with zero load on the PCI bus. This is the pre-port to FPGA beta version written in "c" with PCAP and BPF.
b67e244ec592a0c5a1242966f36937d8dfd7d5e17d6725951479d2a05fc108b9
Loud Listener is a light-weight high speed voice packet recorder that can target a particular call based on SIP URL or TG, designed to satisfy regulatory lawful Intercept requirements. This proof of concept code has been designed to be pushed to an FPGA on an accelerated platform but in its current form, it will run on most versions of Linux.
57e5623476d8c06864d49cb43d5ee359c127b0dbbb7a3705578f3519de6a4cef
i-am-doh is a utility that filters approximately 75% of all false-positives given by an IDS. It uses existing reliable tools like Nmap, Nessus, and Amap to validate IDS alerts based on the following criteria and techniques: OS identification, service identification, port scanning, vulnerability scanning, online CVE and bug interpretation, and server importance weighting.
8240812efc3fddb3c130b13349ca734da19a96a92366c88e4e6aa21be0bd7fd3
WIDZ version 1.8 is an IDS system for 802.11 that guards access points and monitors local frequencies for potentially malevolent activity. It detects scans, association floods, and bogus or rogue APs. It can easily be integrated with SNORT or RealSecure.
7eaaaa7ef04553766dafd60b7eabb6d62e07109fd991ce91186616fb307e0c95
fatajack is a modified Wlan Jack that sends a deauth instead of an auth. This tool highlights poor AP security and works by sending authentication requests to an AP with an inappropriate authentication algorithm and status code. This causes most makes to drop the relevant associated session.
5b4c8235dc1aa20a0096f52dea4f1c9832db9cee0de8bddad235a411167b0ced
WIDZ version 1.5 is a proof of concept IDS system for 802.11 that guards an AP(s) and Monitors local frequencies for potentially malevolent activity. It detects scans, association floods, and bogus/Rogue AP's. It can easily be integrated with SNORT or RealSecure.
bba8b890ad9df45e6ae49f336a63ff99c182541545f7c64b5f1175fb906b5632
WIDZ version 1 is a proof of concept IDS system for 802.11 that guards an AP(s) and Monitors local frequencies for potentially malevolent activity. It detects scans, association floods, and bogus/Rogue AP's. It can easily be integrated with SNORT or RealSecure.
8f8488eea9838a824c0a830e09fb3cac0fd6fbd51a0708fb1eaebae8e6f21294