what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 101 RSS Feed

Files from Francisco Amato

Email addressfamato at infobyte.com.ar
First Active2005-03-22
Last Active2024-03-21
Faraday 1.0.16
Posted Dec 21, 2015
Authored by Francisco Amato

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

Changes: Immunity Canvas plugin added. Added Dig plugin. Added Traceroute plugin. Various other updates and fixes.
tags | tool, rootkit
systems | unix
SHA-256 | 53da89d5c48f26c0de9020e49b3846f04e034b5b376537463c65565ab2d9503f
Distro Checker 1.0.1
Posted Oct 6, 2015
Authored by Francisco Amato | Site blog.infobytesec.com

Distro Checker is a tool written for doing cross distribution exploit testing.

Changes: Various updates.
tags | tool
systems | unix
SHA-256 | 022a90231764ed9b0e48572c61d2794b93fa205b0a56e7db376cd45c213afd39
Faraday 1.0.15
Posted Oct 6, 2015
Authored by Francisco Amato

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

Changes: Hosts and Services views now have pagination and search. Continuous Scanning Tool cscan added to ./scripts/cscan. Added sections of Commercial versions. Various other updates and additions.
tags | tool, rootkit
systems | unix
SHA-256 | ec2e393341678fc93eb61c1bbf9cdc6a0b41885d9bbd93b0417173fe657a7509
Faraday 1.0.14
Posted Sep 10, 2015
Authored by Francisco Amato | Site github.com

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

Changes: Removed old couchdb upgrade process. Refactored GUI Web. Various other updates and additions.
tags | tool, rootkit
systems | unix
SHA-256 | 839f26db7940b505813ce047ddd26ae71f41b83ecb0aa74057ebfdc424b8057e
Faraday 1.0.13
Posted Aug 23, 2015
Authored by Francisco Amato

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

Changes: Exported CSV contains filters and columns from Status Report in WEB UI. Added quick vuln edit and delete in WEB UI. Expanded Unit Tests for WEB UI. Various other updates and additions.
tags | tool, rootkit
systems | unix
SHA-256 | 5d449b6f6c55b74d06b56b7435bc79236d2b0002e905211fd0c11d6d20b34d8c
Distro Checker 1.0.0
Posted Aug 4, 2015
Authored by Francisco Amato | Site blog.infobytesec.com

Distro Checker is a tool written for doing cross distribution exploit testing.

tags | tool
systems | unix
SHA-256 | 8bc23f4e57fc2885ba6b8d8ec2eba603aec8e5155f4bf85739fce47220e6419f
Faraday 1.0.11
Posted Jul 1, 2015
Authored by Francisco Amato

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

Changes: Added hosts CRUD. Added services CRUD. Fix ubuntu 15.04 installation bug. Small bug in burp plugin "Import new vulnerabilities" checkbox issue. Added an interactive visualization to calculate the value of a Workspace. Fixed several bugs in WEB UI. Added a URL filter functionality to the status report, allowing searches by fields.
tags | tool, rootkit
systems | unix
SHA-256 | caf8607f90c09b613a5acce793a6ee44c801f19df790ef5d3d0d2b6adb7b2ef9
Faraday 1.0.10
Posted May 7, 2015
Authored by Francisco Amato

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

tags | tool, rootkit
systems | unix
SHA-256 | 75029b8d4d531fbdfff18bd0e3ee54ea38df3769050cbdc44c4ce4d02f4960f1
Evilgrade - The Update Exploitation Framework 2.0
Posted Nov 1, 2010
Authored by Francisco Amato | Site infobyte.com.ar

Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates. This framework comes into play when the attacker is able to make traffic redirection, and such thing can be done in several ways such as: DNS tampering, DNS Cache Poisoning, ARP spoofing Wi-Fi Access Point impersonation, DHCP hijacking with your favorite tools. This way you can easy take control of a fully patched machine during a penetration test in a clean and easy way. The main idea behind the is to show the amount of trivial errors in the update process of mainstream applications.

Changes: 63 new modules have been added.
tags | tool, spoof
systems | unix
SHA-256 | abe0dd1c3735bce07b9684ce4258af4a715be51ad2ad60997051802f63489950
isr-evilgrade-1.0.0.tar.gz
Posted Jul 28, 2008
Authored by Francisco Amato | Site infobyte.com.ar

ISR-evilgrade is a module framework that allows you to take advantage of poor upgrade implementations by injecting fake updates. This tool is especially useful for DNS cache poisoning attacks.

tags | exploit
advisories | CVE-2008-1447
SHA-256 | e76335e42f8a96170e521a354e344acbe972302a445d7803a8159c90337ad9c3
novell-overflow.txt
Posted Jul 10, 2008
Authored by Francisco Amato | Site infobyte.com.ar

The Novell GroupWise Messenger Client (GWIM) version 2.0 suffers from a remote stack overflow.

tags | advisory, remote, overflow
advisories | CVE-2008-2703, CVE-2008-2704
SHA-256 | 0fb39ff951d74e35b5a129db53f49ed20fcdbbf0accc0c08afe719441500a16c
ISR-novell_groupwise.tar.gz
Posted Dec 14, 2007
Authored by Francisco Amato | Site infobyte.com.ar

Metasploit modules for versions 2.7 and 3.0 that exploit a remote stack overflow vulnerability in IMG tag handling for the Novell GroupWise Client version 6.5.6.

tags | exploit, remote, overflow
SHA-256 | c7f87e5264f047a444fdc06b37cfacf18100fb37bdabb5f934e7284defcb4bc2
ISR-groupwise.txt
Posted Dec 14, 2007
Authored by Francisco Amato | Site infobyte.com.ar

The Novell GroupWise Client version 6.5.6 suffers from a remote stack overflow vulnerability.

tags | advisory, remote, overflow
SHA-256 | a819ef2d83abd412bef155a5e4a2da786a3f32837d7e10681fc2080cbf6a83ba
ISR-sqlget-1.0.0.tar.gz
Posted Jun 26, 2007
Authored by Francisco Amato | Site infobyte.com.ar

ISR-sqlget is a blind SQL injection tool developed in Perl. It supports 20 databases, has various evasions features, SSL and proxy support, and more.

tags | tool, scanner, perl, sql injection
systems | unix
SHA-256 | 4ac98124e44160901dbd4f0fd6e7b92ffa530dcbfcbc73d2f2122fe5549a1093
ISR-ibm-eGatherer.tar.gz
Posted Aug 29, 2006
Authored by Francisco Amato | Site infobyte.com.ar

This Metasploit module exploits a code execution vulnerability in the IBM eGatherer ActiveX buffer overflow.

tags | exploit, overflow, code execution, activex
advisories | CVE-2006-4221
SHA-256 | 6280365f18cd390c0a7ec483822ae21f3d8ac6a2a269541e0bb334fa7e54938e
ISR-novellxss.txt
Posted Aug 18, 2006
Authored by Francisco Amato | Site infobyte.com.ar

Novell Groupwise WebAccess is susceptible to cross site scripting attacks. Versions 7 and 6.5 are susceptible.

tags | advisory, xss
advisories | CVE-2006-3817
SHA-256 | ed89535ccb04b5ad07312b883638ed4b701ecaca83e8db67c376289feaf92856
ISR-novell.txt
Posted Sep 27, 2005
Authored by Francisco Amato

The client in Novell GroupWise version 6.5.3 is susceptible to an integer overflow. Previous versions are also believed vulnerable.

tags | advisory, overflow
SHA-256 | 4479e84b3e7793c8486d9d5b65049c1958e50d78ec10b6f6901bfecb11feee05
novellBO653.txt
Posted Jul 28, 2005
Authored by Francisco Amato | Site infobyte.com.ar

The Novell GroupWise 6.5.3 client suffers from a remote buffer overflow vulnerability.

tags | advisory, remote, overflow
SHA-256 | 416b19430a2eb949354f800a7e077717fb0241942ea239754df3b2782f4eea1e
ISR-form-v1.0.tar.gz
Posted Jun 18, 2005
Authored by Francisco Amato | Site infobyte.com.ar

Simple html parsing tool that extracts all form related information and generates reports of the data. Allows for quick analyzing of data.

systems | unix
SHA-256 | 775fd1d04e6784cb43827f6833c3d84a21025eb24ec1d5d74d99f835e403ad60
ISR-siteprotector.txt
Posted Apr 18, 2005
Authored by Francisco Amato | Site infobyte.com.ar

Infobyte Security Research - Internet Security Systems SiteProtector is susceptible to a SQL injection vulnerability.

tags | advisory, sql injection
SHA-256 | 3636850a45049d289c0e445a2f236801060729106bcd68e90ef13802bc211eab
ISR-blackicefs.txt
Posted Apr 18, 2005
Authored by Francisco Amato | Site infobyte.com.ar

Infobyte Security Research - Internet Security Systems, RealSecure Desktop and BlackICE PC Protection are susceptible to a format string vulnerability.

tags | advisory
SHA-256 | c352cb5d6de0867080b0e4c7a99e36c4571ac6f69924224a9ab7bd87f543c114
ISR-blackicebo.txt
Posted Apr 18, 2005
Authored by Francisco Amato | Site infobyte.com.ar

Infobyte Security Research - Internet Security Systems, RealSecure Desktop and BlackICE PC Protection are susceptible to a local buffer overflow.

tags | advisory, overflow, local
SHA-256 | 8d58e114193e0e9a2634141ef46bec3f4e27d648d916ac5c5262fbb7e40fe817
ISR-ichainBrute.txt
Posted Mar 22, 2005
Authored by Francisco Amato | Site infobyte.com.ar

Infobyte Security Research - Novell iChain Mini FTP Server version 2.3 allows for brute force attacks.

tags | advisory, cracker
SHA-256 | a28f43bb0a444a7e603b1b3e6da5d9e04d4944ab47e69e1c01d092e90cb95db7
ISR-ichainInsecure.txt
Posted Mar 22, 2005
Authored by Francisco Amato | Site infobyte.com.ar

Infobyte Security Research - Novell iChain Mini FTP Server version 2.3 fails to securely pass credentials.

tags | advisory
SHA-256 | fec0d8c4d7f6ee1dcdea2167477ddacf854d314ce3a9d14fcc8a6e7dd66da471
ISR-ichain23path.txt
Posted Mar 22, 2005
Authored by Francisco Amato | Site infobyte.com.ar

Infobyte Security Research - Novell iChain Mini FTP Server version 2.3 has a full path disclosure flaw.

tags | advisory
SHA-256 | 7e1e53a664debf00564c2070380e704d87cba5cd08627ed0d71d778e6fcbdbe4
Page 4 of 4
Back1234Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close