what you don't know can hurt you
Showing 1 - 25 of 7,070 RSS Feed

Security Tool Files

OpenSSH 8.0p1
Posted Apr 18, 2019
Authored by Damien Miller | Site openssh.com

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

Changes: Various bug fixes and updates.
tags | tool, encryption
systems | linux, unix, openbsd
MD5 | bf050f002fe510e1daecd39044e1122d
Raptor WAF 0.6
Posted Apr 14, 2019
Authored by coolervoid

Raptor is a web application firewall written in C that uses DFA to block SQL injection, cross site scripting, and path traversals.

Changes: Fixed error handlers. Improved and fixed all socket connections.
tags | tool, web, firewall, xss, sql injection
systems | unix
MD5 | 8e5555cd8660e9301c79a579e3ef6dbc
Mandos Encrypted File System Unattended Reboot Utility 1.8.4
Posted Apr 11, 2019
Authored by Teddy | Site fukt.bsnet.se

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.

Changes: Various updates.
tags | tool, remote, root
systems | linux, unix
MD5 | b96edfc8715bce3e8549ab87ac283ec5
Stegano 0.9.3
Posted Apr 10, 2019
Authored by Cedric Bonhomme | Site github.com

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

Changes: It is now possible to either pass the location of an image or directly pass an already opened Image.Image to the hide and reveal methods. Code has been re-formatted a bit with black.
tags | tool, encryption, steganography, python
systems | unix
MD5 | b7d19f78905fb57a5b6dfbcaa8e1cbe4
GNUnet P2P Framework 0.11.0
Posted Apr 9, 2019
Authored by Christian Grothoff | Site ovmj.org

GNUnet is a peer-to-peer framework with focus on providing security. All peer-to-peer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP (IPv4 and IPv6), TCP (IPv4 and IPv6), HTTP, or SMTP messages. GNUnet supports accounting to provide contributing nodes with better service. The primary service build on top of the framework is anonymous file sharing.

Changes: Various updates.
tags | tool, web, udp, tcp, peer2peer
systems | unix
MD5 | a9cff50c834c581034d2771e74a3cc72
Wireshark Analyzer 3.0.1
Posted Apr 9, 2019
Authored by Gerald Combs | Site wireshark.org

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.

Changes: Many crash vulnerabilities have been addressed. Various other updates.
tags | tool, sniffer, protocol
systems | windows, unix
advisories | CVE-2019-10894, CVE-2019-10895, CVE-2019-10896, CVE-2019-10897, CVE-2019-10898, CVE-2019-10899, CVE-2019-10900, CVE-2019-10901, CVE-2019-10902, CVE-2019-10903
MD5 | 370a113e1c8ec240c4621cfb5abb0c52
Stegano 0.9.2
Posted Apr 4, 2019
Authored by Cedric Bonhomme | Site github.com

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

Changes: Updated Pillow dependency to version 6.0.0 in order to fix a bug when opening some PNG files.
tags | tool, encryption, steganography, python
systems | unix
MD5 | 2d3651e2af953902431ca3f079d5b496
Faraday 3.7.0
Posted Apr 4, 2019
Authored by Francisco Amato | Site github.com

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

Changes: New feature vulnerability preview to view vulnerability data. Updated Fierce Plugin. Import can be done from GTK console. Updated Goohost plugin and now Faraday imports Goohost .txt report. Updated plugin for supporting WPScan v-3.4.5. Various other additions and updates.
tags | tool, rootkit
systems | unix
MD5 | 2c61e18d0d5064448f2e903b816c40c2
PHPGGC unserialize() Payload Tool
Posted Apr 2, 2019
Site ambionics.io

PHPGGC is a library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.

tags | tool, php
systems | unix
MD5 | fbf73cc5519faf38c585a6e06002f83e
SQLMAP - Automatic SQL Injection Tool 1.3.4
Posted Apr 1, 2019
Authored by Bernardo Damele | Site sqlmap.sourceforge.net

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

Changes: Various updates.
tags | tool, web, overflow, arbitrary, vulnerability, sql injection
systems | unix
MD5 | 1c8380669ea9d9d35dc6340928d1d738
Clam AntiVirus Toolkit 0.101.2
Posted Mar 27, 2019
Authored by Tomasz Kojm | Site clamav.net

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

Changes: ClamAV 0.101.2 is a patch release to address a handful of security related bugs.
tags | tool, virus
systems | unix
advisories | CVE-2019-1785, CVE-2019-1786, CVE-2019-1787, CVE-2019-1788, CVE-2019-1789, CVE-2019-1798
MD5 | faeb0e286e76c2a26e2e10845e4b68db
GNU Privacy Guard 2.2.15
Posted Mar 26, 2019
Site gnupg.org

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Changes: Multiple bug fixes. New commands --print-wkd-hash and --print-wkd-url for gpg-wks-client.
tags | tool, encryption
MD5 | 3ab87e377aa0af2f463649515bf66508
DNS Spider Multithreaded Bruteforcer 1.1
Posted Mar 22, 2019
Authored by noptrix | Site noptrix.net

DNS Spider is a multi-threaded bruteforcer of subdomains that leverages a wordlist and/or character permutation.

Changes: Added wildcard check. Updated built-in wordlist (23k).
tags | tool, scanner
systems | unix
MD5 | ea9b4999b30bd376df3c9841d4a62b0c
I2P 0.9.39
Posted Mar 22, 2019
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Performance improvements. Various other updates.
tags | tool
systems | unix
MD5 | ef43d441c829d1b225771c5379d3fcb8
Lynis Auditing Tool 2.7.3
Posted Mar 21, 2019
Authored by Michael Boelen | Site cisofy.com

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

Changes: Added detection for Lynis being scheduled (e.g. cronjob). Improved logging and various other changes were added.
tags | tool, scanner
systems | unix
MD5 | 9b7059bb89539feaebb334ab3630cd14
GNU Privacy Guard 2.2.14
Posted Mar 19, 2019
Site gnupg.org

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Changes: Multiple code updates and an updated Russian translation.
tags | tool, encryption
MD5 | 96a21c6341b876d13ed66a9f270806bb
UFONet 1.3
Posted Mar 9, 2019
Authored by psy | Site ufonet.03c8.net

UFONet abuses OSI Layer 7-HTTP to create/manage 'zombies' and to conduct different attacks using GET/POST, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.

Changes: New release called SingularitY! Added TCP starvation DNS amplification attacks. Various other updates.
tags | tool, web, denial of service, spoof
systems | unix
MD5 | 3ca9a099659fa13828bda8d6d798b856
Suricata IDPE 4.1.3
Posted Mar 8, 2019
Site openinfosecfoundation.org

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

Changes: About a dozen bug fixes and one feature added.
tags | tool, intrusion detection
systems | unix
MD5 | 35c4a8e6be3910831649a073950195df
Lynis Auditing Tool 2.7.2
Posted Mar 8, 2019
Authored by Michael Boelen | Site cisofy.com

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

Changes: Added support for doas (OpenBSD), support for systemd-boot boot loader, and various other updates.
tags | tool, scanner
systems | unix
MD5 | 3422cee3b12fc33338fcde003d65e234
Stegano 0.9.1
Posted Mar 7, 2019
Authored by Cedric Bonhomme | Site github.com

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

Changes: Updated Pillow dependency in order to fix a bug when opening some PNG files.
tags | tool, encryption, steganography, python
systems | unix
MD5 | 785c5739dc98309fd35a9c1f45581229
AIDE 0.16.1
Posted Mar 5, 2019
Authored by Rami Lehti

AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire(tm). It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determining which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.

Changes: Various bug fixes.
tags | tool, intrusion detection
systems | unix
MD5 | 1bb877023500451cbad76c8ab1f3ec55
SQLMAP - Automatic SQL Injection Tool 1.3.3
Posted Mar 3, 2019
Authored by Bernardo Damele | Site sqlmap.sourceforge.net

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

Changes: Various updates.
tags | tool, web, overflow, arbitrary, vulnerability, sql injection
systems | unix
MD5 | f6ac90cfc745d2be3d5170314277e32f
Wireshark Analyzer 3.0.0
Posted Feb 28, 2019
Authored by Gerald Combs | Site wireshark.org

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.

Changes: Many user interface improvements have been made. Data following a TCP ZeroWindowProbe is marked as retransmission and not passed to subdissectors. Various other updates.
tags | tool, sniffer, protocol
systems | windows, unix
MD5 | 258d62ac7434d126dc497303c8f7961b
Wireshark Analyzer 2.6.7
Posted Feb 28, 2019
Authored by Gerald Combs | Site wireshark.org

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.

Changes: Memory leak addressed. Various other updates.
tags | tool, sniffer, protocol
systems | windows, unix
MD5 | 6d0545309cace70e51f5555a3a966fbc
OpenSSL Toolkit 1.1.1b
Posted Feb 28, 2019
Site openssl.org

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

Changes: Added SCA hardening for modular field inversion in EC_GROUP through a new dedicated field_inv() pointer in EC_METHOD. Changed the info callback signals for the start and end of a post-handshake message exchange in TLSv1.3. Various other updates.
tags | tool, encryption, protocol
systems | unix
MD5 | 4532712e7bcc9414f5bce995e4e13930
Page 1 of 283
Back12345Next

File Archive:

April 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    21 Files
  • 2
    Apr 2nd
    35 Files
  • 3
    Apr 3rd
    21 Files
  • 4
    Apr 4th
    16 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    1 Files
  • 7
    Apr 7th
    2 Files
  • 8
    Apr 8th
    23 Files
  • 9
    Apr 9th
    19 Files
  • 10
    Apr 10th
    15 Files
  • 11
    Apr 11th
    14 Files
  • 12
    Apr 12th
    11 Files
  • 13
    Apr 13th
    2 Files
  • 14
    Apr 14th
    5 Files
  • 15
    Apr 15th
    14 Files
  • 16
    Apr 16th
    19 Files
  • 17
    Apr 17th
    19 Files
  • 18
    Apr 18th
    8 Files
  • 19
    Apr 19th
    4 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close