seeing is believing
Showing 76 - 100 of 6,755 RSS Feed

Security Tool Files

Mosca Analysis Tool 0.08
Posted May 18, 2017
Authored by coolervoid

Mosca is a tool that checks code for poor security practices akin to using grep against it for static analysis.

Changes: Various updates.
tags | tool, scanner
systems | unix
MD5 | 1c2146ec97020d86e5d699b6d9b3bc80
Stegano 0.8.1
Posted May 17, 2017
Authored by Cedric Bonhomme | Site github.com

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

Changes: It is now possible to specify the encoding (UTF-8 or UTF-32LE) of the message to hide/reveal through the command line. Various other updates.
tags | tool, encryption, steganography, python
systems | unix
MD5 | 891843e201858230aa98462890551801
Falco 0.6.1
Posted May 16, 2017
Authored by Sysdig | Site sysdig.org

Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

Changes: Small changes to token bucket used to throttle falco events. Various other fixes and changes.
tags | tool, intrusion detection
systems | unix
MD5 | 5cff672d550bdd68a80566fdd54b00cf
Payload Mask 0.2
Posted May 16, 2017
Authored by coolervoid

Payload Mask is a payload editor that can mutate an initial dataset.

Changes: Various updates.
tags | tool
systems | unix
MD5 | 4c486a7c8a5ddaa85bf3285200b14335
TOR Virtual Network Tunneling Tool 0.3.0.7
Posted May 16, 2017
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: Tor 0.3.0.7 fixes a medium-severity security bug in earlier versions of Tor 0.3.0.x, where an attacker could cause a Tor relay process to exit. Relays running earlier versions of Tor 0.3.0.x should upgrade; clients are not affected.
tags | tool, remote, local, peer2peer
systems | unix
MD5 | fee12ede9172905ba3258db871b6c499
Stegano 0.8
Posted May 8, 2017
Authored by Cedric Bonhomme | Site github.com

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

Changes: Improved checks. Various other updates.
tags | tool, encryption, steganography, python
systems | unix
MD5 | beb7dc3eeeb3355209841da9382180a4
Disable Intel AMT
Posted May 8, 2017
Authored by Bart Blaze

This is a tool written to disable Intel AMT on Windows.

tags | tool
systems | windows
MD5 | bc1f6e645655fc0660c483e5146ec7bd
Stegano 0.7.1
Posted May 5, 2017
Authored by Cedric Bonhomme | Site github.com

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

Changes: Improved generators for the lsb-set module. Improved tests for generators. Improved type hints.
tags | tool, encryption, steganography, python
systems | unix
MD5 | b5a834b30983c3cf7d0ccb6f2bcc4c48
I2P 0.9.30
Posted May 5, 2017
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Various updates and bug fixes.
tags | tool
systems | unix
MD5 | 9240edcde532f64b4dbdcd0f04e22cc4
Hydra Network Logon Cracker 8.5
Posted May 4, 2017
Authored by van Hauser, thc | Site thc.org

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

Changes: New command line option. Changed the format of the restore file to detect cross platform copies. Various bug fixes.
tags | tool, web, imap
systems | cisco, unix
MD5 | 20e097ff7ee11f1c02a9fd2e626a2f97
Lynis Auditing Tool 2.5.0
Posted May 4, 2017
Authored by Michael Boelen | Site cisofy.com

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

Changes: Multiple updates including but not limited to use of ROOTDIR variable instead of fixed paths, removal of unused code and comments, and more. Various tests added.
tags | tool, scanner
systems | unix
MD5 | 4e7599f42d54905b8fd2e9252f4d5289
OpenStego Free Steganography Solution 0.7.1
Posted May 1, 2017
Authored by Samir Vaidya | Site github.com

OpenStego is a tool implemented in Java for generic steganography, with support for password-based encryption of the data. It supports plugins for various steganographic algorithms (currently, only Least Significant Bit algorithm is supported for images).

Changes: GUI changes to support window resizing. File permissions fix for Linux. Added support for changing JPEG compression level (via openstego.ini file). Maintain metadata while writing images (e.g. EXIF for JPEG).
tags | tool, java, encryption, steganography
MD5 | 89bee67dd8ccc41f793aaad247542bca
fimap Inclusion Scanner
Posted May 1, 2017
Authored by Iman Karim | Site tha-imax.de

fimap is a little python tool which can find, prepare, audit, exploit and even google automatically for local and remote file inclusion bugs in web applications.

tags | tool, remote, web, local, scanner, python, file inclusion
systems | unix
MD5 | c521918aff624c30203b6f8679f04c80
TOR Virtual Network Tunneling Tool 0.3.0.6
Posted Apr 27, 2017
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: Tor 0.3.0.6 is the first stable release of the Tor 0.3.0 series. With the 0.3.0 series, clients and relays now use Ed25519 keys to authenticate their link connections to relays, rather than the old RSA1024 keys that they used before. (Circuit crypto has been Curve25519-authenticated since 0.2.4.8-alpha.) This series also includes numerous other small features and bugfixes, along with more groundwork for the upcoming hidden-services revamp.
tags | tool, remote, local, peer2peer
systems | unix
MD5 | d5db24b73d737632618350b5f36d5342
Uberscan Brute Forcing Tool
Posted Apr 26, 2017
Authored by Batch McNulty

Uberscan is an IP scanner and brute forcing tool all in one. Written in perl.

tags | tool, scanner, perl
systems | unix
MD5 | c2206c84617814483c4882184580d507
Thycotic Secret Server Data Decrypter
Posted Apr 21, 2017
Site security-assessment.com

This is a powershell script that decrypts the data stored within a Thycotic Secret Server.

tags | tool
systems | unix
MD5 | c3ef218b8c5e5cfd1fbf7bc4ca2fe3d6
DAVOSET 1.3.2
Posted Apr 21, 2017
Authored by MustLive

DAVOSET is a tool for committing distributed denial of service attacks using execution on other sites.

Changes: Added support of XXE vulnerability in CyberPower Systems PowerPanel. Also added new services into full list of zombies and removed non-working services from full list of zombies.
tags | tool, denial of service
MD5 | d9cb293fa192aa9fed9dd38b1effbde1
Packet Fence 7.0.0
Posted Apr 20, 2017
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: Added provisioning support for SentinelOne. Added MariaDB Galera cluster support. All services are now handled by systemd. Various other updates and improvements.
tags | tool, remote
systems | unix
MD5 | de39bf9e6741b6e2f5a5fdeadfe99e93
Blue Team Training Toolkit (BT3) 2.2
Posted Apr 17, 2017
Authored by Juan J. Guelfo | Site encripto.no

Blue Team Training Toolkit (BT3) is an attempt to introduce improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. The Blue Team Training Toolkit is written in Python, and it includes the latest versions of Encripto's Maligno and Pcapteller.

Changes: This release focuses on usability. New commands have been implemented, and error messages related to API operations are now more descriptive.
tags | tool, python
systems | unix
MD5 | 25b5c99f377d029bc54e7c2f708d20b1
360-FAAR Firewall Analysis Audit And Repair 0.6.2
Posted Apr 17, 2017
Authored by Dan Martin | Site sourceforge.net

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Changes: This release fixes the bug in the cisco asa drop log parser that missed %ASA-6-106100. Various other updates.
tags | tool, perl
systems | unix
MD5 | b89c2831979ada2d1e3b0440139a40b5
Wireshark Analyzer 2.2.6
Posted Apr 13, 2017
Authored by Gerald Combs | Site wireshark.org

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.

Changes: Various updates.
tags | tool, sniffer, protocol
systems | windows, unix
MD5 | 2cd9a35c2df8c32668c1776784f074df
Ansvif 1.7
Posted Apr 13, 2017
Authored by Marshall Whittaker | Site oxagast.github.io

Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault.

Changes: This release marks easier compiling on most modern operating systems including Windows 7, Windows 10, Linux (Redhat and Debian based distros), and OpenBSD. It may compile/work on other operating systems but has not been tested. This is mostly a source code release with lots of code cleanup, and no new features.
tags | tool, fuzzer
systems | unix
MD5 | 477bcf4f4f8b5e2294e46d20f0d9f8d1
rldns Man-In-The-Middle Tool
Posted Apr 7, 2017
Authored by Ringlayer | Site ringlayer.net

rldns-mitm is a modified version of rldns version 1.1 to support man-in-the-middle attacks. Whatever dns request is received will always return a single ip address, which has been assigned via a command line argument.

tags | tool
systems | unix
MD5 | f06203709b6ea6684ebd8c8c0c94f4bd
Samhain File Integrity Checker 4.2.1
Posted Apr 6, 2017
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: Various updates.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
MD5 | 40fdc9d20233e6c63da2ecd3a623fbe2
DAVOSET 1.3.1
Posted Apr 6, 2017
Authored by MustLive

DAVOSET is a tool for committing distributed denial of service attacks using execution on other sites.

Changes: New services added into list of zombies. Non-working services removed. Security bypass added by using cookies are appropriate sites.
tags | tool, denial of service
MD5 | 6bccdf94dc473d5e07af715976147182
Page 4 of 271
Back23456Next

File Archive:

September 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    5 Files
  • 2
    Sep 2nd
    5 Files
  • 3
    Sep 3rd
    3 Files
  • 4
    Sep 4th
    13 Files
  • 5
    Sep 5th
    16 Files
  • 6
    Sep 6th
    15 Files
  • 7
    Sep 7th
    20 Files
  • 8
    Sep 8th
    16 Files
  • 9
    Sep 9th
    4 Files
  • 10
    Sep 10th
    2 Files
  • 11
    Sep 11th
    15 Files
  • 12
    Sep 12th
    19 Files
  • 13
    Sep 13th
    20 Files
  • 14
    Sep 14th
    38 Files
  • 15
    Sep 15th
    31 Files
  • 16
    Sep 16th
    1 Files
  • 17
    Sep 17th
    7 Files
  • 18
    Sep 18th
    15 Files
  • 19
    Sep 19th
    40 Files
  • 20
    Sep 20th
    15 Files
  • 21
    Sep 21st
    15 Files
  • 22
    Sep 22nd
    12 Files
  • 23
    Sep 23rd
    2 Files
  • 24
    Sep 24th
    2 Files
  • 25
    Sep 25th
    11 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close