Skip to content

Tools

Third party news from technology sources

1.3k Topics 1.3k Posts
  • AIDE 0.18.5

    1
    0 Votes
    1 Posts
    16 Views
    CerberusC

    AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire™. It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determining which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.

    https://packetstormsecurity.com/files/173264/aide-0.18.5.tar.gz

  • I2P 2.3.0

    1
    0 Votes
    1 Posts
    20 Views
    CerberusC

    I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

    https://packetstormsecurity.com/files/173263/i2psource_2.3.0.tar.bz2

  • Falco 0.35.1

    1
    0 Votes
    1 Posts
    21 Views
    CerberusC

    Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about Falco as a mix between snort, ossec and strace.

    https://packetstormsecurity.com/files/173230/falco-0.35.1.tar.gz

  • Proxmark3 4.16717 Custom Firmware

    1
    0 Votes
    1 Posts
    15 Views
    CerberusC

    This is a custom firmware written for the Proxmark3 device. It extends the currently available firmware.

    https://packetstormsecurity.com/files/173144/proxmark3-4.16717.tar.gz

  • Suricata IDPE 6.0.13

    1
    0 Votes
    1 Posts
    16 Views
    CerberusC

    Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It’s capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

    https://packetstormsecurity.com/files/172972/suricata-6.0.13.tar.gz

  • AIDE 0.18.4

    1
    0 Votes
    1 Posts
    18 Views
    CerberusC

    AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire™. It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determining which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.

    https://packetstormsecurity.com/files/172911/aide-0.18.4.tar.gz

  • Hydra Network Logon Cracker 9.5

    1
    0 Votes
    1 Posts
    15 Views
    CerberusC

    THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

    https://packetstormsecurity.com/files/172903/thc-hydra-9.5.tar.gz

  • Tenshi Log Monitoring Program 0.18

    1
    0 Votes
    1 Posts
    15 Views
    CerberusC

    tenshi is a log monitoring program, designed to watch one or more log files for lines matching user defined regular expressions and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.

    https://packetstormsecurity.com/files/172821/tenshi-0.18.tar.gz

  • Falco 0.35.0

    1
    0 Votes
    1 Posts
    18 Views
    CerberusC

    Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about Falco as a mix between snort, ossec and strace.

    https://packetstormsecurity.com/files/172784/falco-0.35.0.tar.gz

  • Faraday 4.4.0

    1
    0 Votes
    1 Posts
    14 Views
    CerberusC

    Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

    https://packetstormsecurity.com/files/172688/faraday-4.4.0.tar.gz

  • AIEngine 2.4.0

    1
    0 Votes
    1 Posts
    16 Views
    CerberusC

    AIEngine is a next generation interactive/programmable Python/Ruby/Java/Lua and Go network intrusion detection system engine. AIEngine also helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.

    https://packetstormsecurity.com/files/172681/aiengine-2.4.0.tar.gz

  • OpenSSL Toolkit 3.1.1

    1
    0 Votes
    1 Posts
    16 Views
    CerberusC

    OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer and Transport Layer Security protocols with full-strength cryptography world-wide. The 3.1.x series is the current major version of OpenSSL.

    https://packetstormsecurity.com/files/172609/openssl-3.1.1.tar.gz

  • OpenSSL Toolkit 3.0.9

    1
    0 Votes
    1 Posts
    21 Views
    CerberusC

    OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer and Transport Layer Security protocols with full-strength cryptography world-wide. The 3.x series is the current major version of OpenSSL.

    https://packetstormsecurity.com/files/172608/openssl-3.0.9.tar.gz

  • OpenSSL Toolkit 1.1.1u

    1
    0 Votes
    1 Posts
    18 Views
    CerberusC

    OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer and Transport Layer Security protocols with full-strength cryptography world-wide.

    https://packetstormsecurity.com/files/172607/openssl-1.1.1u.tar.gz

  • Wireshark Analyzer 4.0.6

    1
    0 Votes
    1 Posts
    22 Views
    CerberusC

    Wireshark is a GTK±based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

    https://packetstormsecurity.com/files/172578/wireshark-4.0.6.tar.xz

  • tc Tor Chat Client

    1
    0 Votes
    1 Posts
    26 Views
    CerberusC

    tc is a low-tech free software to chat anonymously and ciphered over Tor circuits in PGP. Use it to protected your communication end-to-end with RSA/DSA encryption and keep yourself anonymously reachable by anyone who only knows your .onion address and your public key. All this and more in 2400 lines of C code that compile and run on BSD and Linux systems with an IRC like GUI.

    https://packetstormsecurity.com/files/172562/tc.tgz

  • Stegano 0.11.2

    1
    0 Votes
    1 Posts
    27 Views
    CerberusC

    Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

    https://packetstormsecurity.com/files/172508/Stegano-0.11.2.tar.gz

  • Zeek 5.0.9

    1
    0 Votes
    1 Posts
    19 Views
    CerberusC

    Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek’s user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.

    https://packetstormsecurity.com/files/172493/zeek-5.0.9.tar.gz

  • Nmap Port Scanner 7.94

    1
    0 Votes
    1 Posts
    21 Views
    CerberusC

    Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.

    https://packetstormsecurity.com/files/172494/nmap-7.94.tgz

  • AIDE 0.18.3

    1
    0 Votes
    1 Posts
    22 Views
    CerberusC

    AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire™. It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determining which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.

    https://packetstormsecurity.com/files/172425/aide-0.18.3.tar.gz