AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Proxifier pe error 32 bit subsystem12/20/2023 ![]() Specify targets and run sets of tools against them.Ī userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit.īLAKE2 file hash sum check. This is an archive of various tools that help perform vulnerability scanning and analysis, information gathering, password auditing, and forensics. It can identify about 150 different ciphers. GUI-based python tool for arp posioning and dns poisoning attacks.Ī combination of a honeypot, file-system monitoring, system hardening, and overall health of a server to create a comprehensive way to secure a system.Īn ASP fingerprinting tool and vulnerability scanner.Ĭlient/server implementation of the TFTP protocol that implements RFCs 1350, 2090, 2347, 2348, and 2349Ī SSL cipher scanner that checks all cipher codes. Monitor ARP changes in ethernet networks.Ī portable handler daemon that make ARP protocol secure in order to avoid the Man In The Middle (MITM) attack through ARP Spoofing, ARP Cache Poisoning or ARP Poison Routing (APR) attacks. Network monitoring tool with flow control.Ī graphical cyber attack management tool for Metasploit.ĪRM Shellcode Generator (Mostly Thumb Mode).Ī tool that uses ARP to discover and fingerprint IP hosts on the local network ![]() This perl script will enumerate the usernames on a unix system that use the apache module UserDir.ĪP Hopper is a program that automatically hops between access points of different wireless networks.Ī small python script designed for enumerating valid APNs (Access Point Name) on a GTP-C speaking device.Ī feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.Īrduino SDK (includes patched avrdude and librxtx) Platform-Tools for Google Android SDK (adb and fastboot).īruteforce the Android Passcode given the hash and salt.Ī perl script that lets you search for 3rd party passwords, dump the call log, dump contacts, dump wireless configuration, and more.Ī free software python client designed to navigate anonymously on social networks. Reverse engineering, Malware and goodware analysis of Android applications and more.Ī python tool to help in forensics analysis on android.Ī tool for reengineering Android apk files. This program fills the table of clients of the AP with random MACs doing impossible new connections.Ī script to simplify the use of aircrack-ng tools.Ī tool for generic packet injection on an 802.11 network.Ī vhost discovery tool that scrapes various web applications. Key cracker for the 802.11 WEP and WPA-PSK protocolsĪ modification of aireplay that allows for a DOS in in the AP. ![]() Security-oriented fuzzer using compile-time instrumentation and genetic algorithmsĪ client for the Apple Filing Protocol (AFP)Ī very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible targets and a multithreaded brute-forcing module which attacks parallel all discovered hosts or given ip addresses from a list.Ī packet inspection engine with capabilities of learning without any human intervention.Ī GUI front-end to dd/dc3dd designed for easily creating forensic images. Reads data from stdin and outputs encrypted or decrypted results to stdout.Ī backconnect shell for Windows and Unix written in python and uses AES in CBC mode in conjunction with HMAC-SHA256 for secure transport.Īn extensible open format for the storage of disk images and related forensic information. This python script looks for a large amount of possible administrative interfaces on a given site. A simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that a given phone can display on its screen interfaceĪDM DNS spoofing tools – Uses a variety of active and passive methods to spoof DNS packets. Web security tool to make fuzzing at HTTP inputs, made in C with libCurl.Ī password dictionary attack tool that targets windows authentication via the SMB protocol.Īutomated Corporate Enumerator.
0 Comments
Read More
Leave a Reply. |