Skip to content

Tools

Third party news from technology sources

1.3k Topics 1.3k Posts
  • 0 Votes
    1 Posts
    57 Views

    This is a C language reverse shell generator that is written in Python.

    https://packetstormsecurity.com/files/167699/C-language-reverse-shells.py.txt

  • 0 Votes
    1 Posts
    70 Views

    Global Socket is a tool for moving data from here to there, securely, fast, and through NAT and firewalls. It uses the Global Socket Relay Network to connect TCP pipes, has end-to-end encryption (using OpenSSL’s SRP / RFC-5054), AES-256 and key exchange using 4096-bit Prime, requires no PKI, has Perfect Forward Secrecy, and TOR support.

    https://packetstormsecurity.com/files/167691/gsocket-1.4.37.tar.gz

  • 0 Votes
    1 Posts
    49 Views

    This script is a great tool for pentesters needing to create reverse shells using either bash or netcat.

    https://packetstormsecurity.com/files/167690/bashnetcat-reverse.txt

  • 0 Votes
    1 Posts
    58 Views

    This tool can be embedded into AI systems for storing information and deleting it very efficiently by using queues disguising themselves as arrays and adding data and removing the data using pointers and flags.

    https://packetstormsecurity.com/files/167636/Queue_ADT_.py.txt

  • 0 Votes
    1 Posts
    66 Views

    Blue Team Training Toolkit (BT3) is an attempt to introduce improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. The Blue Team Training Toolkit is written in Python, and it includes the latest versions of Encripto’s Maligno and Pcapteller.

    https://packetstormsecurity.com/files/167631/BT3-2.9.tar.gz

  • 0 Votes
    1 Posts
    63 Views

    Global Socket is a tool for moving data from here to there, securely, fast, and through NAT and firewalls. It uses the Global Socket Relay Network to connect TCP pipes, has end-to-end encryption (using OpenSSL’s SRP / RFC-5054), AES-256 and key exchange using 4096-bit Prime, requires no PKI, has Perfect Forward Secrecy, and TOR support.

    https://packetstormsecurity.com/files/167626/gsocket-1.4.36.tar.gz

  • 0 Votes
    1 Posts
    64 Views

    Google’s American Fuzzy Lop is a brute-force fuzzer coupled with an exceedingly simple but rock-solid instrumentation-guided genetic algorithm. afl++ is a superior fork to Google’s afl. It has more speed, more and better mutations, more and better instrumentation, custom module support, etc.

    https://packetstormsecurity.com/files/167615/AFLplusplus-4.01c.tar.gz

  • 0 Votes
    1 Posts
    55 Views

    MIMEDefang is a flexible MIME email scanner designed to protect Windows clients from viruses. Includes the ability to do many other kinds of mail processing, such as replacing parts of messages with URLs. It can alter or delete various parts of a MIME message according to a very flexible configuration file. It can also bounce messages with unacceptable attachments. MIMEDefang works with the Sendmail 8.11 and newer “Milter” API, which makes it more flexible and efficient than procmail-based approaches.

    https://packetstormsecurity.com/files/167612/mimedefang-3.0.tar.gz

  • 0 Votes
    1 Posts
    62 Views

    OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

    https://packetstormsecurity.com/files/167558/openssl-1.1.1p.tar.gz

  • 0 Votes
    1 Posts
    65 Views

    Wireshark is a GTK±based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

    https://packetstormsecurity.com/files/167557/wireshark-3.6.6.tar.xz

  • 0 Votes
    1 Posts
    67 Views

    Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). This is the source code release.

    https://packetstormsecurity.com/files/167544/tor-0.4.7.8.tar.gz

  • Zeek 4.2.2

    6 Jun 2022, 15:19
    0 Votes
    1 Posts
    71 Views

    Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek’s user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.

    https://packetstormsecurity.com/files/167415/zeek-4.2.2.tar.gz

  • Falco 0.32.0

    6 Jun 2022, 15:13
    0 Votes
    1 Posts
    71 Views

    Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

    https://packetstormsecurity.com/files/167413/falco-0.32.0-x86_64.tar.gz

  • 0 Votes
    1 Posts
    77 Views

    GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts: client and server. GRR client is deployed on systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. “Work” means running a specific action: downloading file, listing a directory, etc. GRR server infrastructure consists of several components (frontends, workers, UI servers) and provides web-based graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data.

    https://packetstormsecurity.com/files/167300/grr-3.4.6.0-release.tar.gz

  • I2P 1.8.0

    24 May 2022, 17:44
    0 Votes
    1 Posts
    62 Views

    I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

    https://packetstormsecurity.com/files/167251/i2psource_1.8.0.tar.bz2

  • 0 Votes
    1 Posts
    69 Views

    Deliverance is a file descriptor fuzzer written in bash. It injects random data into file descriptors of pids associated with a process until the program crashes, then outputs the results of what caused the crash. It leaves behind files that were used as input for the last 2 minutes before the fault, useful for reproduction.

    https://packetstormsecurity.com/files/167245/deliverance-0.018-daf9452.sh.txt

  • 0 Votes
    1 Posts
    65 Views

    This is a small tool written to help decrypt encrypted TP-Link backups.

    https://packetstormsecurity.com/files/167239/tplink_backup_decrypt_2022.bin-main.zip

  • 0 Votes
    1 Posts
    84 Views

    Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

    https://packetstormsecurity.com/files/167205/lynis-3.0.8.tar.gz

  • 0 Votes
    1 Posts
    106 Views

    Cooper utilizes cooperative mutation to test the binding code of scripting languages to find memory-safe issues. Cooperative mutation simultaneously modifies the script code and the related document objects to explore various code paths of the binding code. To support cooperative mutation, the authors infer the relationship between script code and document objects to guide the two-dimensional mutation. They applied their tool Cooper on three popular commercial PDF tools, Adobe Acrobat, Foxit Reader, and Microsoft Word. Cooper detected 134 previously unknown bugs, which resulted in 33 CVE entries and 22K bug bounties.

    https://packetstormsecurity.com/files/167161/Cooper-master.zip

  • 0 Votes
    1 Posts
    66 Views

    aircrack-ng is a set of tools for auditing wireless networks. It’s an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.).

    https://packetstormsecurity.com/files/167112/aircrack-ng-1.7.tar.gz