Quantcast
Channel: anon80 – Security List Network™
Browsing all 62 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

EmPyre v1.0.1 – A post-exploitation OSX/Linux agent.

Changelog 06/17/2016 – RELEASE 1.0.1: ================================= – Agent now supports python 2.6.x (thanks to calmhavoc <calmhavoc@gmail.com>) – Teensy stager for micro controller...

View Article


Image may be NSFW.
Clik here to view.

ByteForce – Offline Digital Forensics Tool for Binary Files.

Offline Digital Forensics Tool for Binary Files This tool can be used for (offline) digital forensics and malware analysis as it shows all raw bytes of a file and also the ASCII representations. As you...

View Article


Image may be NSFW.
Clik here to view.

POOFITEE v0.0.1 – Linux Scripting “Perfect Owner Only Firewall – Invisible To...

Changelog POOFITEE v0.0.1: – At first blush, we thought POOFITEE was operational 2016-09-16, but a few bugs remained until 2016-10-01. After 2016-10-01 this “Original” branch is only expected to...

View Article

Image may be NSFW.
Clik here to view.

The Penetration Testers Framework (PTF) v1.10 codename: Tool Time.

Changelog ptf v1.10: * allow use modules within other modules – no longer need to use back * add pipal (spoonman) * fix credcrack (bustedsec) * add spoopy-ng (bustedsec) * add nessus-parser (spoonman)...

View Article

Image may be NSFW.
Clik here to view.

cyber security incident response platform.

FIR (Fast Incident Response) is an cybersecurity incident management platform designed with agility and speed in mind. It allows for easy creation, tracking, and reporting of cybersecurity incidents....

View Article


Image may be NSFW.
Clik here to view.

AntiFooling – Prevent the Malware Execution.

AntiFooling is a tool designed for preventing the Malware Execution. This is possible through the exploitation of the most common exceptions for Anti-Emulation and Anti-Debuging techniques used by the...

View Article

Image may be NSFW.
Clik here to view.

Firewall kernel module.

The kernel module which implements 3 firewall rules as mentioned below: 1. Block all unsolicited ICMP packets coming in from outside except the ones going to the web-server. However,the local hosts...

View Article

Image may be NSFW.
Clik here to view.

Maltrail is a malicious traffic detection system.

Latest changelog Maltrail v0.10.154: + Minor update related to the last commit. + Minor patch Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing...

View Article


Image may be NSFW.
Clik here to view.

netdump – Remote collect configuration (dumps) from networked switches,...

netdump is a Remote collect configuration (dumps) from networked switches, routers, firewalls using expect php library Dependencies: + PHP and PHP Development Framework + (PHP Extension and Application...

View Article


Image may be NSFW.
Clik here to view.

Walls of Fire – Universal firewall configuration generator.

Walls of Fire(wofgen) Universal firewall configuration generator wit easy to use ipfw, iptables, netsh, ipf/pf, ufw, wipfw, etc.. Dependencies: + C++ compiler + C++ STL Eveything but ipf/pf and wipfw...

View Article

Image may be NSFW.
Clik here to view.

Lynis v2.4.4 – is a system and security auditing tool for Unix/Linux.

Changelog Lynis v2.4.4 (2017-03-01): * Changes: + Fix for upload function to be used from profile + Reduce screen output for mail section, unless –verbose is used + Code cleanups and removed ‘update...

View Article

Image may be NSFW.
Clik here to view.

AnomalyWebApplicationFirewall – an anomaly based web application firewall.

AnomalyWebApplicationFirewall is a script that used to unify access logs. The only prerequisites are that the nessesary parameters are logged and that all of the parameters are surrounded with double...

View Article

Image may be NSFW.
Clik here to view.

tcpreplay is a suite of tools to edit and replay captured network traffic.

Tcpreplay is a suite of free Open Source utilities for editing and replaying previously captured network traffic. Originally designed to replay malicious traffic patterns to Intrusion...

View Article


Image may be NSFW.
Clik here to view.

PyPortRedirector – TCP/IP to redirect all data from one address to another by...

PyPortRedirector is A simple Linux TCP client-server proxy able to redirect all data from one address to another by preserving source IP address written in Python. About The client can listen on one or...

View Article

Image may be NSFW.
Clik here to view.

lifer – A forensics tool for Windows link file examinations (i.e. Windows...

‘lifer‘ is a Windows or *nix command-line tool inspired by the whitepaper ‘The Meaning of Link Files in Forensic Examinations’ by Harry Parsonage and available here. It started life as a lightweight...

View Article


Image may be NSFW.
Clik here to view.

SIP-DAS is a tool developed to simulate SIP-based DoS attacks.

SIP-DAS (DoS Attack Simulator) is a tool developed to simulate SIP-based DoS attacks. It has been developed to be used in academic work to help developing novel SIP-based DDoS attacks and defense...

View Article

Image may be NSFW.
Clik here to view.

Scutum is an ARP firewall that prevents your computer from being arp spoofed.

Scutum is an ARP firewall that prevents your computer from being arp spoofed. Scutum controls “arptables” in your computer so it accepts ARP packets only from the gateway. This way, when people with...

View Article


Image may be NSFW.
Clik here to view.

Pentest-Detections ~ WannaCry and Petya Fast Detection Tool.

Pentest-Detections is a Repository for penetration testing tools and Vulnerability scanner for MS17-010. Feature: + IPv4, IPv6 compatible. + IPv6 auto discover mode + Input range, file-list support +...

View Article

Image may be NSFW.
Clik here to view.

userline – Query and report user logons relations from MS Windows Security...

userline is a tool automates the process of creating logon relations from MS Windows Security Events by showing a graphical relation among users domains, source and destination logons as well as...

View Article

Image may be NSFW.
Clik here to view.

TROMMEL: Sift Through Directories of Files to Identify Indicators That May...

TROMMEL – sifts through directories of files to identify indicators that may contain vulnerabilities. TROMMEL identifies the following indicators related to: – Secure Shell (SSH) key files – Secure...

View Article
Browsing all 62 articles
Browse latest View live