Exploit the possiblities
Showing 76 - 100 of 8,177 RSS Feed

Operating System: UNIX

AIEngine 1.8.0
Posted Jun 24, 2017
Authored by Luis Campo Giralte | Site bitbucket.org

AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.

Changes: Support for Point to Point over Ethernet protocol. Support for multiple schedulers (multiple Timers). Support for Radix trees on IP lookups. Various other updates and changes.
tags | tool
systems | unix
MD5 | d9eab973015d9ae7367b5b6444304b5f
Nmap Port Scanner 7.50
Posted Jun 14, 2017
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.

Changes: Integrated all of the service/version detection fingerprints submitted from September to March (855 of them). The signature count went up 2.9% to 11,418. It now detects 1193 protocols from apachemq, bro, and clickhouse to jmon, slmp, and zookeeper. Added 14 NSE scripts from 12 authors, bringing the total up to 566! Various other updates.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
MD5 | 800a67cfe2b0fbbd159793467debd71a
WPForce 1.0.0
Posted Jun 12, 2017
Authored by n00py | Site github.com

WPForce is a suite of Wordpress Attack tools. Currently this contains 2 scripts - WPForce, which brute forces logins via the API, and Yertle, which uploads shells once admin credentials have been found. Yertle also contains a number of post exploitation modules.

tags | tool, shell, scanner
systems | unix
MD5 | 1cbb5b143c74242defcaf578c5b9a98e
TOR Virtual Network Tunneling Tool 0.3.0.8
Posted Jun 9, 2017
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: Tor 0.3.0.8 fixes a pair of bugs that would allow an attacker to remotely crash a hidden service with an assertion failure. Anyone running a hidden service should upgrade to this version, or to some other version with fixes for TROVE-2017-004 and TROVE-2017-005. Tor 0.3.0.8 also includes fixes for several key management bugs that sometimes made relays unreliable, as well as several other bugfixes described below.
tags | tool, remote, local, peer2peer
systems | unix
MD5 | c5c88b7e17f652c9fb4fc2c2ee92943c
Suricata IDPE 3.2.2
Posted Jun 7, 2017
Site openinfosecfoundation.org

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

Changes: This release fixes a fairly small number of issues. It also improves the unix-socket runmode by allowing both single and autofp runmodes to be specified.
tags | tool, intrusion detection
systems | unix
MD5 | a686400bf8eaa9eced918eed11e92bbe
Proxmark 3.0.0
Posted Jun 5, 2017
Authored by Christian Herrmann | Site github.com

The proxmark3 is a powerful general purpose RFID tool, the size of a deck of cards, designed to snoop, listen and emulate everything from Low Frequency (125kHz) to High Frequency (13.56MHz) tags. This repository contains enough software, logic (for the FPGA), and design documentation for the hardware that you could, at least in theory, do something useful with a proxmark3.

Changes: This major release addresses backwards compatibility issues and command structure changes to the source code. Added hardnested attack. Improved low frequency functionality. Improved mifare check keys functionality. Various other updates.
tags | tool
systems | unix
MD5 | 47774a912892f89cfe94490858e1c07d
Wireshark Analyzer 2.2.7
Posted Jun 1, 2017
Authored by Gerald Combs | Site wireshark.org

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.

Changes: Removed imagemagick and demote xdg-utils dependencies. Various updates.
tags | tool, sniffer, protocol
systems | windows, unix
MD5 | a4d880554c7f925dafef60fa313b580d
Packet Fence 7.1.0
Posted Jun 1, 2017
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: Various other updates and improvements.
tags | tool, remote
systems | unix
MD5 | d4b7e5c73309c83e6adbabf0e0c793db
Lynis Auditing Tool 2.5.1
Posted Jun 1, 2017
Authored by Michael Boelen | Site cisofy.com

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

Changes: Hebrew translation by Dolev Farhi. Improved detection of SSL certificate files. Minor changes to improve logging and results.
tags | tool, scanner
systems | unix
MD5 | 5b9da89c616344bbc73cbc5688a4a0bd
Falco 0.7.0
Posted May 31, 2017
Authored by Sysdig | Site sysdig.org

Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

Changes: Update the priorities of falco rules to use a wider range of priorities rather than just ERROR/WARNING. Various other fixes and changes.
tags | tool, intrusion detection
systems | unix
MD5 | edd8b765f608c7a2e923e6a99b4a7e69
MailSecRep Email Analysis Tool For Outlook
Posted May 29, 2017
Authored by Mark Osborne

MailSecRep adds an Outlook button to analyze email for spoofing, hostile links, and malware attachments.

tags | tool, spoof
systems | unix
MD5 | e6a70c5d2a3117ee0b1db0fc257758e4
Packet Fence 7.0.2
Posted May 27, 2017
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: Fixed useless sessions being created in web-auth in the dispatcher. Various other updates and improvements.
tags | tool, remote
systems | unix
MD5 | bcec765a0ac429e2a9c093d31ebace8d
Faraday 2.5.0
Posted May 27, 2017
Authored by Francisco Amato | Site github.com

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

Changes: Fixed bug when editing workspaces created in GTK. Improved host search in the WEB UI. Extended the config to support different searching engines in the WEB UI. Various other improvements and fixes.
tags | tool, rootkit
systems | unix
MD5 | 6985aed517f20114a7efaed4a1210188
OpenSSL Toolkit 1.0.2l
Posted May 27, 2017
Site openssl.org

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

Changes: Very minor update.
tags | tool, encryption, protocol
systems | unix
MD5 | f85123cd390e864dfbe517e7616e6566
Ubuntu Security Notice USN-3300-1
Posted May 27, 2017
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3300-1 - Ryan Beisner discovered juju did not set permissions on a Unix domain socket. A local attacker could use this flaw to gain administrative privileges.

tags | advisory, local
systems | linux, unix, ubuntu
advisories | CVE-2017-9232
MD5 | 122108d3e4e85403cf70b4953c9c7dd5
Apple iOS / OS X NSKeyedArchiver Memory Corruption
Posted May 24, 2017
Authored by Google Security Research, ianbeer

Apple iOS / OS X suffer from a NSKeyedArchiver memory corruption vulnerability due to a lack of bounds checking in CAMediaTimingFunctionBuiltin.

tags | exploit
systems | unix, apple, ios
advisories | CVE-2017-2527
MD5 | 23db36b84cf1781ab0aa9de1337b3eae
Apple iOS / MacOS NSKeyedArchiver Heap Corruption
Posted May 24, 2017
Authored by Google Security Research, ianbeer

Apple iOS / MacOS suffers from a NSKeyedArchiver heap corruption vulnerability due to a rounding error in TIKeyboardLayout initWithCoder:.

tags | exploit
systems | unix, apple, ios
advisories | CVE-2017-2524
MD5 | f4f95e9fe07f16fd6bb2e6208f80ac9f
Apple iOS / MacOS NSCharacterSet Memory Corruption
Posted May 24, 2017
Authored by Google Security Research, ianbeer

Apple iOS / MacOS suffers from a memory corruption vulnerability due to bad bounds checking in NSCharacterSet coding for NSKeyedUnarchiver.

tags | exploit
systems | unix, apple, ios
advisories | CVE-2017-2522
MD5 | bdda55cda546b5c21d799497330d24d7
Apple iOS / MacOS Netagent Kernel Memory Disclosure
Posted May 24, 2017
Authored by Google Security Research, ianbeer

Apple iOS / MacOS suffers from a kernel memory disclosure vulnerability due to lack of bounds checking in netagent socket option handling.

tags | exploit, kernel
systems | unix, apple, ios
advisories | CVE-2017-2507
MD5 | 45cfcbcc7c332ce751e0f1cb5ebc14cc
Apple iOS / MacOS Domain Socket Kernel Use-After-Free
Posted May 24, 2017
Authored by Google Security Research, ianbeer

Apple iOS / MacOS suffer from a kernel use-after-free vulnerability due to bad locking in unix domain socket file descriptor externalization.

tags | exploit, kernel
systems | unix, apple, ios
advisories | CVE-2017-2501
MD5 | bdf2e91d40e4ff551aba3904d5996640
TestSSL 2.8
Posted May 20, 2017
Authored by Dr. Dirk Wetter | Site drwetter.org

testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws, and much more. It is written in (pure) bash, makes only use of standard Unix utilities, openssl and last but not least bash sockets.

Changes: Trust chain check. Various other improvements and updates.
tags | tool, scanner, protocol, bash
systems | unix
MD5 | cdd9e2481d19cfcb8ded787e767aa4cf
Nixauditor CIS Script 1.1
Posted May 19, 2017
Authored by Alfie | Site the-infosec.com

Nixauditor is a script to audit linux and unix distributions based mainly on the CIS standards and universal linux hardening guidelines.

Changes: Audit script enabling user to audit Kernel info, Kernel versions, Specific release information, Current user/group info, Users that have previously logged onto the system, All users and uid/gid info. General CIS Checks (over 100 security checks).
tags | tool
systems | linux, unix
MD5 | 735e54fcda535e1a853e135ded8d89f1
AntiRansom 3.02
Posted May 18, 2017
Authored by YJesus | Site security-projects.com

AntiRansom is a tool capable of detecting and mitigating attacks of Ransomware using honeypots.

Changes: Fixed bug in Windows 10 'Creators' that makes AR crash. This release **** IS ONLY **** for Windows 10 Creators.
tags | tool
systems | unix
MD5 | 7e8e043c0b499fbdaf2b565808f07b62
Mosca Analysis Tool 0.08
Posted May 18, 2017
Authored by coolervoid

Mosca is a tool that checks code for poor security practices akin to using grep against it for static analysis.

Changes: Various updates.
tags | tool, scanner
systems | unix
MD5 | 1c2146ec97020d86e5d699b6d9b3bc80
Stegano 0.8.1
Posted May 17, 2017
Authored by Cedric Bonhomme | Site github.com

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

Changes: It is now possible to specify the encoding (UTF-8 or UTF-32LE) of the message to hide/reveal through the command line. Various other updates.
tags | tool, encryption, steganography, python
systems | unix
MD5 | 891843e201858230aa98462890551801
Page 4 of 328
Back23456Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close