exploit the possibilities
Showing 1 - 25 of 7,434 RSS Feed

Security Tool Files

WhatWeb Scanner 0.5.5
Posted Jan 15, 2021
Authored by Andrew Horton | Site morningstarsecurity.com

WhatWeb is a next-generation web scanner. WhatWeb recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1800 plugins, each to recognize something different. WhatWeb also identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more. WhatWeb supports an aggression level to control the trade off between speed and reliability.

Changes: 1 fix, 8 new plugins, and 3 plugin updates.
tags | tool, web, scanner, javascript
systems | unix
MD5 | bc2f2e427e390103121096cda4697849
GNU Privacy Guard 2.2.27
Posted Jan 12, 2021
Site gnupg.org

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Changes: Fixed --gpgconf-list case with no conf files at all. Fixed description of two new options. Minor permission fix in wkd for created files.
tags | tool, encryption
MD5 | a9c002b5356103c97412955a1956ae0c
Flawfinder 2.0.15
Posted Jan 12, 2021
Authored by David A. Wheeler | Site sourceforge.net

Flawfinder searches through source code for potential security flaws, listing potential security flaws sorted by risk, with the most potentially dangerous flaws shown first. This risk level depends not only on the function, but on the values of the parameters of the function.

Changes: Fixed some release problems in 2.0.14. Improved handling of LoadLibraryEx.
tags | tool
systems | unix
MD5 | fca72a4b9aa51833442f8ffaebd05f19
jSQL Injection 0.83
Posted Jan 11, 2021
Authored by ron190 | Site github.com

jSQL Injection is a lightweight application used to find database information from a distant server. jSQL Injection is also part of the official penetration testing distribution Kali Linux and is included in various other distributions like Pentest Box, Parrot Security OS, ArchStrike and BlackArch Linux. This is the pre-built jar release.

Changes: Various new preferences like thread control, User agent, Zip and Dios modes. Added 11 database engines. Various other additions.
tags | tool, scanner, sql injection
systems | linux, unix
MD5 | 819babadb98b56e7367ca5f3df865c4d
jSQL Injection 0.83 Source Code Release
Posted Jan 11, 2021
Authored by ron190 | Site github.com

jSQL Injection is a lightweight application used to find database information from a distant server. jSQL Injection is also part of the official penetration testing distribution Kali Linux and is included in various other distributions like Pentest Box, Parrot Security OS, ArchStrike and BlackArch Linux. This is the source code release.

Changes: Various new preferences like thread control, User agent, Zip and Dios modes. Added 11 database engines. Various other additions.
tags | tool, scanner, sql injection
systems | linux, unix
MD5 | ff856f45b190724cb5f562e78e919396
Flawfinder 2.0.14
Posted Jan 11, 2021
Authored by David A. Wheeler | Site sourceforge.net

Flawfinder searches through source code for potential security flaws, listing potential security flaws sorted by risk, with the most potentially dangerous flaws shown first. This risk level depends not only on the function, but on the values of the parameters of the function.

Changes: Various Windows improvements. Various C++ improvements.
tags | tool
systems | unix
MD5 | a4ca0788f54251466cc5fc4cd2b9020d
Lynis Auditing Tool 3.0.3
Posted Jan 7, 2021
Authored by Michael Boelen | Site cisofy.com

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

Changes: A couple additions including an OS detection of Parrot GNU/Linux along with three changes.
tags | tool, scanner
systems | unix
MD5 | 44b26983029929912d5bab53a083f776
ZyXEL Godmode Backdoor Account Scanner
Posted Jan 5, 2021
Authored by Todor Donev

zyHell is a perl script that scans for the ZyXEL godmode backdoor account.

tags | tool, scanner, perl
systems | unix
MD5 | 794576265f9d76d9bcf6317f345fb8e9
URLCrazy Domain Name Typo Tool 0.7.2
Posted Jan 5, 2021
Authored by Andrew Horton (urbanadventurer) | Site github.com

URLCrazy is a tool that can generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage. It generates 15 types of domain variants, knows over 8000 common misspellings, supports multiple keyboard layouts, can check if a typo is a valid domain, tests if domain typos are in use, and estimates the popularity of a typo.

Changes: Fixed a bug where output to a file did not work.
tags | tool, web
systems | unix
MD5 | a6d4a8a2dbc4aa6b326acce3a33b5c1b
SQLMAP - Automatic SQL Injection Tool 1.5
Posted Jan 4, 2021
Authored by Bernardo Damele | Site sqlmap.sourceforge.net

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

Changes: Bug fixes.
tags | tool, web, overflow, arbitrary, vulnerability, sql injection
systems | unix
MD5 | c07963ad8b64601adc6f1793b84d5786
tcpdump 4.99.0
Posted Jan 4, 2021
Site tcpdump.org

tcpdump allows you to dump the traffic on a network. It can be used to print out the headers and/or contents of packets on a network interface that matches a given expression. You can use this tool to track down network problems, to detect many attacks, or to monitor the network activities.

Changes: Improved the contents, wording and formatting of the man page. Prints unsupported link-layer protocol packets in hex. Added support for new network protocols and DLTs. Various other updates.
tags | tool, sniffer
systems | unix
MD5 | b10aa2f497def7283bc060f626879ce5
Haveged 1.9.14
Posted Jan 4, 2021
Site issihosts.com

haveged is a daemon that feeds the /dev/random pool on Linux using an adaptation of the HArdware Volatile Entropy Gathering and Expansion algorithm invented at IRISA. The algorithm is self-tuning on machines with cpuid support, and has been tested in both 32-bit and 64-bit environments. The tarball uses the GNU build mechanism, and includes self test targets and a spec file for those who want to build an RPM.

Changes: New command added to havegecmd.c. Made enttest configurable.
tags | tool
systems | linux, unix
MD5 | f756474201bec9a46b41e8712f79468a
PIMT 1.0
Posted Jan 4, 2021
Authored by Jeremy Brown | Site github.com

PIMT is a Public Infrastructure Monitoring Tool (pronounced PIM-tee). It queries common recon tools for publicly available data regarding particular organizations based on the domains and keywords provided. It is not meant to provide complete coverage for every external asset that belongs to a company as attackers usually do not have this detailed info or mapping either. One can use it to paint some sort of picture of what external attackers may be looking at, the changes occurring over time and insight for how to further harden the perimeter. The key idea being to provide valuable data to red teams as well as addition al monitoring capabilities for defenders.

tags | tool
systems | unix
MD5 | 15640e4fe41be31efdca68b52b77e376
Sifter 11.3
Posted Jan 2, 2021
Authored by s1l3nt78 | Site github.com

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

Changes: Various additions.
tags | tool, remote, local, scanner, vulnerability
systems | unix
MD5 | e3263e50bd67640e189745f61ed3be7d
cryptmount Filesystem Manager 5.3.3
Posted Jan 1, 2021
Authored by RW Penney | Site cryptmount.sourceforge.net

cryptmount is a utility for creating and managing secure filing systems on GNU/Linux systems. After initial setup, it allows any user to mount or unmount filesystems on demand, solely by providing the decryption password, with any system devices needed to access the filing system being configured automatically. A wide variety of encryption schemes (provided by the kernel dm-crypt system and the libgcrypt library) can be used to protect both the filesystem and the access key. The protected filing systems can reside in either ordinary files or disk partitions. The package also supports encrypted swap partitions, and automatic configuration on system boot-up.

Changes: Improved compatability with libcryptsetup-2.x.
tags | tool, kernel, encryption
systems | linux, unix
MD5 | 5953bbad4dfef33bace450477209dae2
FireHOL 3.1.7
Posted Jan 1, 2021
Authored by Costa Tsaousis | Site github.com

FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand.

Changes: Fix dhcpv6 example to say dhcpv6. Various blacklist updates.
tags | tool, spoof, firewall
systems | linux, unix
MD5 | cebc65cd784a3499c0dfa8e28d654545
OATH Toolkit 2.6.5
Posted Dec 29, 2020
Site nongnu.org

OATH Toolkit attempts to collect several tools that are useful when deploying technologies related to OATH, such as HOTP one-time passwords. It is a fork of the earlier HOTP Toolkit.

Changes: Various improvements.
tags | tool
systems | unix
MD5 | 04b9dc96de85204b9fc671e492fce443
Lynis Auditing Tool 3.0.2
Posted Dec 24, 2020
Authored by Michael Boelen | Site cisofy.com

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

Changes: Added OS detection of Flatcar, IPFire, Mageia, NixOS, ROSA Linux, SLES (extended), Void Linux, Zorin OS. Support for Solaris svcs added. Many other additions and changes.
tags | tool, scanner
systems | unix
MD5 | 1b01474e4efaa68a7ad929a93a98fd35
Faraday 3.14.0
Posted Dec 24, 2020
Authored by Francisco Amato | Site github.com

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

Changes: Added RESTless filter to multiples views, improving search. Added import vulnerability templates command to faraday-manage. Added a create_date field to comments. Various other additions and fixes.
tags | tool, rootkit
systems | unix
MD5 | 3061690f2afe841ba29e533a26372b79
Sifter 11.2
Posted Dec 22, 2020
Authored by s1l3nt78 | Site github.com

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

Changes: Various additions.
tags | tool, remote, local, scanner, vulnerability
systems | unix
MD5 | 46ce8afa2e4fa4220f0e7656ed4223a6
Wireshark Analyzer 3.4.2
Posted Dec 21, 2020
Authored by Gerald Combs | Site wireshark.org

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

Changes: A QUIC dissector crash has been addressed. Various updates and new features.
tags | tool, sniffer, protocol
systems | windows, unix
MD5 | cf35d1413e7e3b1429ac7f12c823ccd4
GNU Privacy Guard 2.2.26
Posted Dec 21, 2020
Site gnupg.org

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Changes: New AKL method ntds. Fixed --trusted-key with fingerprint arg. Various other fixes and updates.
tags | tool, encryption
MD5 | 9db554eabd13f83e941a9825e5af5fe6
jSQL Injection 0.82 Source Code Release
Posted Dec 21, 2020
Authored by ron190 | Site github.com

jSQL Injection is a lightweight application used to find database information from a distant server. jSQL Injection is also part of the official penetration testing distribution Kali Linux and is included in various other distributions like Pentest Box, Parrot Security OS, ArchStrike and BlackArch Linux. This is the source code release.

tags | tool, scanner, sql injection
systems | linux, unix, unixwindows
MD5 | 95ed6a2b8d9849ab86dd259a36df25db
jSQL Injection 0.82
Posted Dec 21, 2020
Authored by ron190 | Site github.com

jSQL Injection is a lightweight application used to find database information from a distant server. jSQL Injection is also part of the official penetration testing distribution Kali Linux and is included in various other distributions like Pentest Box, Parrot Security OS, ArchStrike and BlackArch Linux. This is the pre-built jar release.

tags | tool, scanner, sql injection
systems | linux, unix, unixwindows
MD5 | e4de5125a77b273ca40b2aec9f7b82de
Erlang Bytecode String Converter
Posted Dec 21, 2020
Authored by Jeremy Brown

estr2bc is a python script to convert arbitrary string input to Erlang bytecode.

tags | tool, arbitrary, python
systems | unix
MD5 | 095fa28eaa19faca6a6c82b238094580
Page 1 of 298
Back12345Next

File Archive:

January 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    4 Files
  • 2
    Jan 2nd
    3 Files
  • 3
    Jan 3rd
    3 Files
  • 4
    Jan 4th
    33 Files
  • 5
    Jan 5th
    31 Files
  • 6
    Jan 6th
    21 Files
  • 7
    Jan 7th
    15 Files
  • 8
    Jan 8th
    19 Files
  • 9
    Jan 9th
    1 Files
  • 10
    Jan 10th
    1 Files
  • 11
    Jan 11th
    33 Files
  • 12
    Jan 12th
    19 Files
  • 13
    Jan 13th
    27 Files
  • 14
    Jan 14th
    8 Files
  • 15
    Jan 15th
    16 Files
  • 16
    Jan 16th
    0 Files
  • 17
    Jan 17th
    0 Files
  • 18
    Jan 18th
    0 Files
  • 19
    Jan 19th
    0 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close