the original cloud security
Showing 101 - 125 of 6,735 RSS Feed

Security Tool Files

TOR Virtual Network Tunneling Tool 0.2.9.10
Posted Mar 3, 2017
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: Tor 0.2.9.10 backports a security fix for users who build Tor with the --enable-expensive-hardening option. It also includes fixes for some major issues affecting directory authorities, LibreSSL compatibility, and IPv6 correctness.
tags | tool, remote, local, peer2peer
systems | unix
MD5 | 6760a646a096b61e307b84fb5ae93cc7
Hashcat Advanced Password Recovery 3.40 Source Code
Posted Mar 3, 2017
Authored by Kartan | Site hashcat.net

Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release.

Changes: Added support for loading hccapx files. Added support for filtering hccapx message pairs using --hccapx-message-pair. - Added support for parsing 7-Zip hashes with LZMA/LZMA2 compression indicator set to a non-zero value. Many other additions.
tags | tool, cracker
systems | unix
MD5 | 86f54b93af53325008cb2fd6b0d47d80
Hashcat Advanced Password Recovery 3.40 Binary Release
Posted Mar 3, 2017
Authored by Kartan | Site hashcat.net

Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release.

Changes: Added support for loading hccapx files. Added support for filtering hccapx message pairs using --hccapx-message-pair. - Added support for parsing 7-Zip hashes with LZMA/LZMA2 compression indicator set to a non-zero value. Many other additions.
tags | tool, cracker
MD5 | 8261eab7131cf5722d33bb6aa7b2df39
Capstone 3.0.5
Posted Mar 3, 2017
Authored by Nguyen Anh Quynh | Site capstone-engine.org

Capstone is a multi-architecture, multi-platform disassembly framework. It has a simple and lightweight architecture-neutral API, thread-safe by design, provides details on disassembled instruction, and more.

Changes: Release 3.0.5-RC2 is a release candidate version, with important fixes in the core and several bindings.
tags | tool
systems | unix
MD5 | d8ebb36e9880c270e2fbb2770956917f
I2P 0.9.29
Posted Mar 3, 2017
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Various updates and bug fixes.
tags | tool
systems | unix
MD5 | 45da06b536d80e91b2bb5f0940520c69
Lynis Auditing Tool 2.4.4
Posted Mar 3, 2017
Authored by Michael Boelen | Site cisofy.com

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

Changes: Fix for upload function to be used from profile. Reduce screen output for mail section, unless --verbose is used. Code cleanups and removed update release command.
tags | tool, scanner
systems | unix
MD5 | 61ac17a05652a50cf2fcf17bc2faae12
NetSTR 0.20
Posted Mar 3, 2017
Authored by Jay Fink | Site systhread.net

NetSTR is an open source small, fast and easy to use port scanner and packet sniffer. IPv4 scanner can perform ranged, single or use an internal top ports list plus it has a flexible timers/port capability. IPv6 single port single host is supported. The tcp and arp sniffers print an easy to read dump format and have a full packet decode capability. Additionally netstr sports a fuzzy passive network scanner.

Changes: Added show capability to udpscan. Moved prog.h to netstr.h to avoid any future conflicts. Initial UDP support added.
tags | tool, scanner, tcp
systems | unix
MD5 | 5cbf53d0abcacc32b91627a6cc9bfb27
SQLMAP - Automatic SQL Injection Tool 1.1.3-4
Posted Mar 1, 2017
Authored by Bernardo Damele | Site sqlmap.org

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

Changes: Major improvements to program stabilization based on user reports. Added new tampering scripts avoiding popular WAF/IPS/IDS mechanisms. Fixed major bug with DNS leaking in Tor mode. Various other support added.
tags | tool, web, overflow, arbitrary, vulnerability, sql injection
systems | unix
MD5 | ffae51561a220c8e8b7e8c677559b6e5
Packet Fence 6.5.1
Posted Feb 25, 2017
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: 593 new code commits added.
tags | tool, remote
systems | unix
MD5 | 05523aa6e2c477f89752656bec674b78
Ansvif 1.6.2
Posted Feb 25, 2017
Authored by Marshall Whittaker | Site oxagast.github.io

Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault.

Changes: This release has lots of code cleanup, bug fixes, and includes a -y or -b 0 option for zero buffer size (useful with -A and -B when in use with other fuzzers), and a -K option to keep going after a crash (usually only useful when logging).
tags | tool, fuzzer
systems | unix
MD5 | cfa6a5023498f09090cfd480c310b8cd
Mandos Encrypted File System Unattended Reboot Utility 1.7.15
Posted Feb 25, 2017
Authored by Teddy | Site fukt.bsnet.se

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.

Changes: Various updates.
tags | tool, remote, root
systems | linux, unix
MD5 | f4cd556a91a8d3b85f0d7698f016f822
Lynis Auditing Tool 2.4.3
Posted Feb 23, 2017
Authored by Michael Boelen | Site cisofy.com

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

Changes: Colored output can now be tuned with profile (colors=yes/no). Allowed data upload to be set as a profile option.
tags | tool, scanner
systems | unix
MD5 | 7d9231dabdae35e9b787e372b26e40c8
Stegano 0.6.7
Posted Feb 23, 2017
Authored by Cedric Bonhomme | Site github.com

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

Changes: Added missing dependency in the setup.py file.
tags | tool, encryption, steganography, python
systems | unix
MD5 | a86c61ff8ca7e4e5b4c2d23d1497ebbe
Windows Exploit Suggester
Posted Feb 22, 2017
Authored by Sam Bertram

This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.

tags | tool
MD5 | 2667a9cef9fe888d5b6d0cb025ba1e8c
Suricata IDPE 3.2.1
Posted Feb 18, 2017
Site openinfosecfoundation.org

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

Changes: A handful of features and multiple bug fixes have been added.
tags | tool, intrusion detection
systems | unix
MD5 | 61b5cbb70591ea8ff4b26a0b00214a54
Stegano 0.6.5
Posted Feb 18, 2017
Authored by Cedric Bonhomme | Site github.com

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

Changes: Added a command to list all available generators for the lsb-set module. Added a test when the data image is coming via byte stream, for the lsb module.
tags | tool, encryption, steganography, python
systems | unix
MD5 | 1e5f7149efdbe891021f573c6ddbc446
Lynis Auditing Tool 2.4.2
Posted Feb 18, 2017
Authored by Michael Boelen | Site cisofy.com

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

Changes: Properly detects SSH daemon version. Various other updates and additions.
tags | tool, scanner
systems | unix
MD5 | 783a9ec54f9035dfc08327828964c062
FireHOL 3.1.3
Posted Feb 18, 2017
Authored by Costa Tsaousis | Site github.com

FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand.

Changes: More strict when detecting address ranges. Bug fixes.
tags | tool, spoof, firewall
systems | linux, unix
MD5 | 4625f41fc615fd0243b7060535852e2c
AIEngine 1.7.0
Posted Feb 18, 2017
Authored by Luis Campo Giralte | Site bitbucket.org

AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.

Changes: Improvements on the DNS to return matched CNAMES records. Now allows big packets of pcap files. Fixed some minor bugs on IMAP, POP and SSL. Various other updates and changes.
tags | tool
systems | unix
MD5 | 3572a02391c125a9e49ebe8525357e20
Faraday 2.3.1
Posted Feb 9, 2017
Authored by Francisco Amato | Site github.com

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

Changes: Fixed max amount of vulns pagination bug in Web UI. Fixed Maltego plugin.
tags | tool, rootkit
systems | unix
MD5 | 239dc2379920c9cc66b3d13794f370bf
Lynis Auditing Tool 2.4.1
Posted Feb 9, 2017
Authored by Michael Boelen | Site cisofy.com

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

Changes: Generic code improvements. Improved the update check and display. Finish, Portuguese, and Turkish translations. Various other updates and additions.
tags | tool, scanner
systems | unix
MD5 | 1c785cacd65c0c5e9771d7cb980f4313
FireHOL 3.1.2
Posted Feb 8, 2017
Authored by Costa Tsaousis | Site github.com

FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand.

Changes: Included user policies in chains before handling orphans. Saved firewall contents made reproducible by always zeroing counters and removing the dates from comments. Various other updates.
tags | tool, spoof, firewall
systems | linux, unix
MD5 | f6d1f099872da8b6af258b67e4e51189
Stegano 0.6.4
Posted Feb 8, 2017
Authored by Cedric Bonhomme | Site github.com

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

Changes: A command line for the red module has been added. Fixed a bug in the lsb-set command line.
tags | tool, encryption, steganography, python
systems | unix
MD5 | 2bf8e84f0e364bd8eb29908002536cdc
Proxmark Iceman Fork 1.6.9
Posted Feb 8, 2017
Authored by Christian Herrmann | Site github.com

This is a custom firmware written for the proxmark3. It extends the currently available firmware (revision 2.3.0) to support brute force attacks against proximity card access control systems.

Changes: Some bug fixes and multiple additions.
tags | tool
systems | unix
MD5 | 635ccdc1a364e0922c85c5009cf0eb3d
tcpdump 4.9.0
Posted Feb 2, 2017
Site tcpdump.org

tcpdump allows you to dump the traffic on a network. It can be used to print out the headers and/or contents of packets on a network interface that matches a given expression. You can use this tool to track down network problems, to detect many attacks, or to monitor the network activities.

Changes: Improved separation frontend/backend (tcpdump/libnetdissect). No longer requires IPv6 library support in order to support IPv6 addresses. Various other bug fixes and additions.
tags | tool, sniffer
systems | unix
MD5 | 2b83364eef53b63ca3181b4eb56dab0c
Page 5 of 270
Back34567Next

File Archive:

August 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    20 Files
  • 2
    Aug 2nd
    30 Files
  • 3
    Aug 3rd
    20 Files
  • 4
    Aug 4th
    17 Files
  • 5
    Aug 5th
    4 Files
  • 6
    Aug 6th
    2 Files
  • 7
    Aug 7th
    15 Files
  • 8
    Aug 8th
    18 Files
  • 9
    Aug 9th
    10 Files
  • 10
    Aug 10th
    24 Files
  • 11
    Aug 11th
    10 Files
  • 12
    Aug 12th
    3 Files
  • 13
    Aug 13th
    3 Files
  • 14
    Aug 14th
    10 Files
  • 15
    Aug 15th
    16 Files
  • 16
    Aug 16th
    18 Files
  • 17
    Aug 17th
    15 Files
  • 18
    Aug 18th
    17 Files
  • 19
    Aug 19th
    15 Files
  • 20
    Aug 20th
    11 Files
  • 21
    Aug 21st
    15 Files
  • 22
    Aug 22nd
    15 Files
  • 23
    Aug 23rd
    13 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close