Skip to content

Tools

Third party news from technology sources

685 Topics 685 Posts
  • TOR Virtual Network Tunneling Tool 0.4.6.8

    1
    0 Votes
    1 Posts
    54 Views
    CerberusC

    Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). This is the source code release.

    https://packetstormsecurity.com/files/164700/tor-0.4.6.8.tar.gz

  • Zeek 4.1.1

    1
    0 Votes
    1 Posts
    36 Views
    CerberusC

    Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek’s user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.

    https://packetstormsecurity.com/files/164667/zeek-4.1.1.tar.gz

  • GNU Privacy Guard 2.3.3

    1
    0 Votes
    1 Posts
    46 Views
    CerberusC

    GnuPG (the GNU Privacy Guard or GPG) is GNU’s tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. This is the LTS release.

    https://packetstormsecurity.com/files/164631/gnupg-2.3.3.tar.bz2

  • GNU Privacy Guard 2.2.32

    1
    0 Votes
    1 Posts
    42 Views
    CerberusC

    GnuPG (the GNU Privacy Guard or GPG) is GNU’s tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. This is the LTS release.

    https://packetstormsecurity.com/files/164630/gnupg-2.2.32.tar.bz2

  • Faraday 3.18.0

    1
    0 Votes
    1 Posts
    42 Views
    CerberusC

    Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

    https://packetstormsecurity.com/files/164602/faraday-3.18.0.tar.gz

  • AntiRansom 5

    1
    0 Votes
    1 Posts
    37 Views
    CerberusC

    AntiRansom is a tool capable of detecting and mitigating attacks of Ransomware using honeypots.

    https://packetstormsecurity.com/files/164577/AntiRansom-5.tar.gz

  • nfstream 6.3.5

    1
    0 Votes
    1 Posts
    42 Views
    CerberusC

    nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

    https://packetstormsecurity.com/files/164459/nfstream-6.3.5.tar.gz

  • 0 Votes
    1 Posts
    48 Views
    CerberusC

    The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. This is the cross platform package.

    https://packetstormsecurity.com/files/164458/ZAP_2.11.0_Crossplatform.zip

  • Wireshark Analyzer 3.4.9

    1
    0 Votes
    1 Posts
    57 Views
    CerberusC

    Wireshark is a GTK±based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

    https://packetstormsecurity.com/files/164438/wireshark-3.4.9.tar.xz

  • Bing.com Hostname / IP Enumerator 1.0.5

    1
    0 Votes
    1 Posts
    57 Views
    CerberusC

    This tool enumerates hostnames from Bing.com for an IP address. Bing.com is Microsoft’s search engine which has an IP: search parameter. Written in Bash for Linux. Requires wget.

    https://packetstormsecurity.com/files/164380/bing-ip2hosts-1.0.5.tar.gz

  • TestSSL 3.0.6

    1
    0 Votes
    1 Posts
    46 Views
    CerberusC

    testssl.sh is a free command line tool which checks a server’s service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws, and much more. It is written in (pure) bash, makes only use of standard Unix utilities, openssl and last but not least bash sockets.

    https://packetstormsecurity.com/files/164381/testssl.sh-3.0.6.tar.gz

  • PyRDP RDP Man-In-The-Middle Tool

    1
    0 Votes
    1 Posts
    52 Views
    CerberusC

    PyRDP is a Python Remote Desktop Protocol (RDP) Monster-in-the-Middle (MITM) tool and library.

    https://packetstormsecurity.com/files/164378/pyrdp-master.zip

  • Seth RDP Man-In-The-Middle Tool

    1
    0 Votes
    1 Posts
    45 Views
    CerberusC

    Seth is a tool written in Python and Bash to MitM RDP connections by attempting to downgrade the connection in order to extract clear text credentials. It was developed to raise awareness and educate about the importance of properly configured RDP connections in the context of pentests, workshops or talks.

    https://packetstormsecurity.com/files/164377/Seth-master.zip

  • Falco 0.30.0

    1
    0 Votes
    1 Posts
    68 Views
    CerberusC

    Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

    https://packetstormsecurity.com/files/164363/falco-0.30.0.tar.gz

  • 0 Votes
    1 Posts
    51 Views
    CerberusC

    sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user’s specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

    https://packetstormsecurity.com/files/164362/sqlmap-1.5.10.tar.gz

  • Haveged 1.9.15

    1
    0 Votes
    1 Posts
    43 Views
    CerberusC

    haveged is a daemon that feeds the /dev/random pool on Linux using an adaptation of the HArdware Volatile Entropy Gathering and Expansion algorithm invented at IRISA. The algorithm is self-tuning on machines with cpuid support, and has been tested in both 32-bit and 64-bit environments. The tarball uses the GNU build mechanism, and includes self test targets and a spec file for those who want to build an RPM.

    https://packetstormsecurity.com/files/164347/haveged-1.9.15.tar.gz

  • Google Tsunami Security Scanner Pre-Alpha

    1
    0 Votes
    1 Posts
    37 Views
    CerberusC

    Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence. It was originally written by Google and open sourced in July of 2020.

    https://packetstormsecurity.com/files/164325/tsunami-security-scanner-master.zip

  • OpenSSH 8.8p1

    1
    0 Votes
    1 Posts
    57 Views
    CerberusC

    This is a Linux/portable port of OpenBSD’s excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen’s SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

    https://packetstormsecurity.com/files/164301/openssh-8.8p1.tar.gz

  • Zeek 4.0.4

    1
    0 Votes
    1 Posts
    51 Views
    CerberusC

    Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek’s user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.

    https://packetstormsecurity.com/files/164272/zeek-4.0.4.tar.gz

  • Proxmark 4.14434

    1
    0 Votes
    1 Posts
    60 Views
    CerberusC

    This is a custom firmware written for the Proxmark3 device. It extends the currently available firmware.

    https://packetstormsecurity.com/files/164206/proxmark3-4.14434.tar.gz