Skip to content

Tools

Third party news from technology sources

1.3k Topics 1.3k Posts
  • GRAudit Grep Auditing Tool 3.5

    1
    0 Votes
    1 Posts
    18 Views
    CerberusC

    Graudit is a simple script and signature sets that allows you to find potential security flaws in source code using the GNU utility, grep. It’s comparable to other static analysis applications like RATS, SWAAT, and flaw-finder while keeping the technical requirements to a minimum and being very flexible.

    https://packetstormsecurity.com/files/170330/graudit-3.5.tar.gz

  • cryptmount Filesystem Manager 6.1.1

    1
    0 Votes
    1 Posts
    12 Views
    CerberusC

    cryptmount is a utility for creating and managing secure filing systems on GNU/Linux systems. After initial setup, it allows any user to mount or unmount filesystems on demand, solely by providing the decryption password, with any system devices needed to access the filing system being configured automatically. A wide variety of encryption schemes (provided by the kernel dm-crypt system and the libgcrypt library) can be used to protect both the filesystem and the access key. The protected filing systems can reside in either ordinary files or disk partitions. The package also supports encrypted swap partitions, and automatic configuration on system boot-up.

    https://packetstormsecurity.com/files/170327/cryptmount-6.1.1.tar.gz

  • GNU Privacy Guard 2.4.0

    1
    0 Votes
    1 Posts
    13 Views
    CerberusC

    GnuPG (the GNU Privacy Guard or GPG) is GNU’s tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

    https://packetstormsecurity.com/files/170309/gnupg-2.4.0.tar.bz2

  • GNU Privacy Guard 2.2.41

    1
    0 Votes
    1 Posts
    16 Views
    CerberusC

    GnuPG (the GNU Privacy Guard or GPG) is GNU’s tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. This is the LTS release.

    https://packetstormsecurity.com/files/170308/gnupg-2.2.41.tar.bz2

  • Faraday 4.3.1

    1
    0 Votes
    1 Posts
    15 Views
    CerberusC

    Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

    https://packetstormsecurity.com/files/170293/faraday-4.3.1.tar.gz

  • Adversary3 3.0

    1
    0 Votes
    1 Posts
    32 Views
    CerberusC

    Adversary3 is a tool to navigate the vast www.malvuln.com malware vulnerability dataset.

    https://packetstormsecurity.com/files/170270/Adversary3-3.0.zip

  • Global Socket 1.4.39

    1
    0 Votes
    1 Posts
    30 Views
    CerberusC

    Global Socket is a tool for moving data from here to there, securely, fast, and through NAT and firewalls. It uses the Global Socket Relay Network to connect TCP pipes, has end-to-end encryption (using OpenSSL’s SRP / RFC-5054), AES-256 and key exchange using 4096-bit Prime, requires no PKI, has Perfect Forward Secrecy, and TOR support.

    https://packetstormsecurity.com/files/170234/gsocket-1.4.39.tar.gz

  • Wireshark Analyzer 4.0.2

    1
    0 Votes
    1 Posts
    24 Views
    CerberusC

    Wireshark is a GTK±based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

    https://packetstormsecurity.com/files/170130/wireshark-4.0.2.tar.xz

  • TOR Virtual Network Tunneling Tool 0.4.7.12

    1
    0 Votes
    1 Posts
    35 Views
    CerberusC

    Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). This is the source code release.

    https://packetstormsecurity.com/files/170129/tor-0.4.7.12.tar.gz

  • GNUnet P2P Framework 0.19.0

    1
    0 Votes
    1 Posts
    29 Views
    CerberusC

    GNUnet is a peer-to-peer framework with focus on providing security. All peer-to-peer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP (IPv4 and IPv6), TCP (IPv4 and IPv6), HTTP, or SMTP messages. GNUnet supports accounting to provide contributing nodes with better service. The primary service build on top of the framework is anonymous file sharing.

    https://packetstormsecurity.com/files/170115/gnunet-0.19.0.tar.gz

  • Faraday 4.3.0

    1
    0 Votes
    1 Posts
    28 Views
    CerberusC

    Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

    https://packetstormsecurity.com/files/170114/faraday-4.3.0.tar.gz

  • Clam AntiVirus Toolkit 1.0.0

    1
    0 Votes
    1 Posts
    33 Views
    CerberusC

    Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software. This is the LTS release.

    https://packetstormsecurity.com/files/170068/clamav-1.0.0.tar.gz

  • Suricata IDPE 6.0.9

    1
    0 Votes
    1 Posts
    31 Views
    CerberusC

    Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It’s capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

    https://packetstormsecurity.com/files/170067/suricata-6.0.9.tar.gz

  • Falco 0.33.1

    1
    0 Votes
    1 Posts
    26 Views
    CerberusC

    Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about Falco as a mix between snort, ossec and strace.

    https://packetstormsecurity.com/files/170009/falco-0.33.1.tar.gz

  • Zeek 5.0.4

    1
    0 Votes
    1 Posts
    30 Views
    CerberusC

    Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek’s user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.

    https://packetstormsecurity.com/files/170000/zeek-5.0.4.tar.gz

  • Packet Fence 12.1.0

    1
    0 Votes
    1 Posts
    19 Views
    CerberusC

    PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

    https://packetstormsecurity.com/files/169999/packetfence-12.1.0.tar.gz

  • Stegano 0.11.1

    1
    0 Votes
    1 Posts
    21 Views
    CerberusC

    Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

    https://packetstormsecurity.com/files/169990/Stegano-0.11.1.tar.gz

  • I2P 2.0.0

    1
    0 Votes
    1 Posts
    31 Views
    CerberusC

    I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

    https://packetstormsecurity.com/files/169989/i2psource_2.0.0.tar.bz2

  • TOR Virtual Network Tunneling Tool 0.4.7.11

    1
    0 Votes
    1 Posts
    22 Views
    CerberusC

    Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). This is the source code release.

    https://packetstormsecurity.com/files/169820/tor-0.4.7.11.tar.gz

  • Zeek 5.0.3

    1
    0 Votes
    1 Posts
    31 Views
    CerberusC

    Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek’s user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.

    https://packetstormsecurity.com/files/169802/zeek-5.0.3.tar.gz