Twenty Year Anniversary
Showing 1 - 25 of 8,317 RSS Feed

Operating System: UNIX

OpenSSL Toolkit 1.1.0i
Posted Aug 17, 2018
Site openssl.org

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

Changes: Addressed a client denial of service due to a large DH parameter addressed. Cache timing vulnerability fixed. Various other updates and fixes.
tags | tool, encryption, protocol
systems | unix
advisories | CVE-2018-0732, CVE-2018-0737
MD5 | 9495126aafd2659d357ea66a969c3fe1
Debian Security Advisory 4271-1
Posted Aug 14, 2018
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4271-1 - Several vulnerabilities have been discovered in Samba, a SMB/CIFS file, print, and login server for Unix.

tags | advisory, vulnerability
systems | linux, unix, debian
advisories | CVE-2018-10858, CVE-2018-10919
MD5 | 2af05a2b97ffe360a280e8abf1ef54c4
FireHOL 3.1.6
Posted Aug 13, 2018
Authored by Costa Tsaousis | Site github.com

FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand.

Changes: Multiple fixes added to FireHOL. FireQOS had a status fix and has updated sample service definitions to start after network. Various other components were updated as well.
tags | tool, spoof, firewall
systems | linux, unix
MD5 | 4a8ce84950cf1303fa4ad1ff8c5f424a
Lynis Auditing Tool 2.6.7
Posted Aug 9, 2018
Authored by Michael Boelen | Site cisofy.com

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

Changes: Added busybox as a service manager. Changed classification of SSH root login with keys. Various other updates.
tags | tool, scanner
systems | unix
MD5 | 4614aab3885bbe05827c0ba5ca1103f5
Fwknop Port Knocking Utility 2.6.10
Posted Aug 8, 2018
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Added MAX_FW_TIMEOUT to access.conf stanzas to allow a maximum number of seconds for client-specified timeouts in SPA packets. Bug fix in CMD_EXEC mode to make sure to call exit() upon any error from execvpe(). Various other additions and fixes.
tags | tool, scanner, vulnerability
systems | unix
MD5 | 5b5850ab8684ce0bdf52ef400a83065c
Hashcat Advanced Password Recovery 4.2.1 Source Code
Posted Aug 7, 2018
Authored by Kartan | Site hashcat.net

Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release.

Changes: Fixed a buffer overflow in precompute_salt_md5() in case salt was longer than 64 characters. Various other fixes and improvements.
tags | tool, cracker
systems | unix
MD5 | e55a3235e87612b449cf2d9bc47a96ed
Hashcat Advanced Password Recovery 4.2.0 Source Code
Posted Aug 3, 2018
Authored by Kartan | Site hashcat.net

Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release.

Changes: Added 4 hash modes. Various other fixes and improvements.
tags | tool, cracker
systems | unix
MD5 | b67abfb8e995de46f414b726468a3fc5
Falco 0.11.1
Posted Jul 31, 2018
Authored by Sysdig | Site sysdig.org

Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

Changes: Fixed a problem that caused the kernel module to not load on certain kernel versions.
tags | tool, intrusion detection
systems | unix
MD5 | 2c364a28eed999aba8e007dddf9be6dc
Faraday 3.0
Posted Jul 27, 2018
Authored by Francisco Amato | Site github.com

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

Changes: Interface removed from model and from persistence server lib. Performance improvements on the backend. Add quick change workspace name. Various other updates and improvements.
tags | tool, rootkit
systems | unix
MD5 | 36e7f74b93b8cf2944b57637aeab6d30
Falco 0.11.0
Posted Jul 27, 2018
Authored by Sysdig | Site sysdig.org

Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

Changes: Falco can now read events via an ebpf program loaded into the kernel instead of the falco-probe kernel module. Multiple other fixes and improvements.
tags | tool, intrusion detection
systems | unix
MD5 | 4c7222749b522accbc1e3c4bfbfb68ff
libpcap 1.9.0
Posted Jul 24, 2018
Site tcpdump.org

Libpcap is a portable packet capture library which is used in many packet sniffers, including tcpdump.

Changes: Added testing system to libpcap, independent of tcpdump. Changes to how pcap_t is activated. Adding support for Large stream buffers on Endace DAG cards. Changes to BSD 3-clause license to 2-clause licence. Additions to TCP header parsing, per RFC3168. Dozens of other changes and improvements.
tags | library
systems | unix
MD5 | dffd65cb14406ab9841f421732eb0f33
Wireshark Analyzer 2.6.2
Posted Jul 19, 2018
Authored by Gerald Combs | Site wireshark.org

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.

Changes: Updated to QCustomPlot 1.3.2. Various other updates.
tags | tool, sniffer, protocol
systems | windows, unix
MD5 | 086d235509717190d06554b2ab870209
Suricata IDPE 4.0.5
Posted Jul 19, 2018
Site openinfosecfoundation.org

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

Changes: Multiple bugs have been addressed.
tags | tool, intrusion detection
systems | unix
MD5 | ea0cb823d6a86568152f75ade6de442f
Capstone 3.0.5
Posted Jul 18, 2018
Authored by Nguyen Anh Quynh | Site capstone-engine.org

Capstone is a multi-architecture, multi-platform disassembly framework. It has a simple and lightweight architecture-neutral API, thread-safe by design, provides details on disassembled instruction, and more.

Changes: Fixed the include path for Android builds when building cstool. Added possibility to disable universal build for Mac OS. Various other updates and fixes.
tags | tool
systems | unix
MD5 | 2cd59a5a83b50fbf7663b1678bae9410
TOR Virtual Network Tunneling Tool 0.3.3.9
Posted Jul 17, 2018
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: Tor 0.3.3.9 moves to a new bridge authority, meaning people running bridge relays should upgrade.
tags | tool, remote, local, peer2peer
systems | unix
MD5 | 16b24bda0772dc3d5c4c05254ec4bce7
Debian Security Advisory 4243-1
Posted Jul 11, 2018
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4243-1 - Several vulnerabilities were discovered in CUPS, the Common UNIX Printing System.

tags | advisory, vulnerability
systems | linux, unix, debian
advisories | CVE-2017-15400, CVE-2018-4180, CVE-2018-4181, CVE-2018-4182, CVE-2018-4183, CVE-2018-6553
MD5 | 662c30e0c1f0bfe7c7a3d4b17ffa744c
Aircrack-ng Wireless Network Tools 1.3
Posted Jul 11, 2018
Site aircrack-ng.org

aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.).

Changes: Updates to allow using Hashcat HCCAPX files as input files. Fixed floating point exception due to division by 0 when displaying stats. Updated manpage regarding hex wordlist usage. Added save/restore session when cracking using wordlists (-N and -R). Tons of other additions, fixes, and improvements.
tags | tool, wireless
systems | unix
MD5 | c7c5b076dee0c25ee580b0f56f455623
Packet Fence 8.1.0
Posted Jul 11, 2018
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: Added support for dynamic PSK (Cisco IPSK) for the Cisco WLC and hostapd. Added Ubiquiti Unifi web authentication and 802.1X support. Added support for Cambium AP module for 802.1X, MAC and web authentication. Various other additions and updates.
tags | tool, remote
systems | unix
MD5 | 6c4cc0d195d58a30ecba2ab4080e7d05
TOR Virtual Network Tunneling Tool 0.3.3.8
Posted Jul 9, 2018
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: Tor 0.3.3.8 backports several changes from the 0.3.4.x series, including fixes for a memory leak affecting directory authorities.
tags | tool, remote, local, peer2peer
systems | unix
MD5 | 492c31afb03ec39aaf354658682fbf68
Clam AntiVirus Toolkit 0.100.1
Posted Jul 9, 2018
Authored by Tomasz Kojm | Site clamav.net

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

Changes: ClamAV 0.100.1 is a hotfix release to patch a set of vulnerabilities.
tags | tool, virus
systems | unix
advisories | CVE-2017-16932, CVE-2018-0360, CVE-2018-0361
MD5 | 0f653df0480eebcd828939e8db9f0443
Lynis Auditing Tool 2.6.6
Posted Jul 6, 2018
Authored by Michael Boelen | Site cisofy.com

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

Changes: New format of changelog. Improved log text about running kernel version. Couple of fixes.
tags | tool, scanner
systems | unix
MD5 | 3708d3bde6fbe0dbb93dd1dda17b1872
Faraday 3.0b4
Posted Jul 3, 2018
Authored by Francisco Amato | Site github.com

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

Changes: Architecture changes and a new database (PostgreSQL) gives a new and revamped structure that allows you to support new objects and a bigger data volume. Various other updates in this beta release.
tags | tool, rootkit
systems | unix
MD5 | 81e1f641e8b564488caa913465d96cd3
DNS Spider Multithreaded Bruteforcer 1.0
Posted Jul 1, 2018
Authored by noptrix | Site noptrix.net

DNS Spider is a multi-threaded bruteforcer of subdomains that leverages a wordlist and/or character permutation.

Changes: Upgraded hard-coded subdomain wordlist. Various other updates.
tags | tool, scanner
systems | unix
MD5 | 90bb4b96d98d5dace0da730d964aea8a
GRR 3.2.3.2
Posted Jun 28, 2018
Authored by Andreas Moser, Mikhail Bushkov, Ben Galehouse, Milosz Lakomy | Site github.com

GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts: client and server. GRR client is deployed on systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. "Work" means running a specific action: downloading file, listing a directory, etc. GRR server infrastructure consists of several components (frontends, workers, UI servers) and provides web-based graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data.

Changes: This is an off-schedule release with a fix for a client-repacking bug introduced in v3.2.3.0.
tags | tool, remote, web, forensics
systems | unix
MD5 | 7aa8402312de71d03f4fab72c0a59707
I2P 0.9.35
Posted Jun 26, 2018
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: This version includes SusiMail folders and SSL Wizard.
tags | tool
systems | unix
MD5 | 5a1cc327e64503f7fabc69b01971052d
Page 1 of 333
Back12345Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

August 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    19 Files
  • 2
    Aug 2nd
    17 Files
  • 3
    Aug 3rd
    16 Files
  • 4
    Aug 4th
    1 Files
  • 5
    Aug 5th
    1 Files
  • 6
    Aug 6th
    19 Files
  • 7
    Aug 7th
    15 Files
  • 8
    Aug 8th
    9 Files
  • 9
    Aug 9th
    7 Files
  • 10
    Aug 10th
    10 Files
  • 11
    Aug 11th
    1 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    14 Files
  • 14
    Aug 14th
    18 Files
  • 15
    Aug 15th
    38 Files
  • 16
    Aug 16th
    16 Files
  • 17
    Aug 17th
    22 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close