EmPyre v1.0.1 – A post-exploitation OSX/Linux agent.
Changelog 06/17/2016 – RELEASE 1.0.1: ================================= – Agent now supports python 2.6.x (thanks to calmhavoc <calmhavoc@gmail.com>) – Teensy stager for micro controller...
View ArticleByteForce – Offline Digital Forensics Tool for Binary Files.
Offline Digital Forensics Tool for Binary Files This tool can be used for (offline) digital forensics and malware analysis as it shows all raw bytes of a file and also the ASCII representations. As you...
View ArticlePOOFITEE v0.0.1 – Linux Scripting “Perfect Owner Only Firewall – Invisible To...
Changelog POOFITEE v0.0.1: – At first blush, we thought POOFITEE was operational 2016-09-16, but a few bugs remained until 2016-10-01. After 2016-10-01 this “Original” branch is only expected to...
View ArticleThe Penetration Testers Framework (PTF) v1.10 codename: Tool Time.
Changelog ptf v1.10: * allow use modules within other modules – no longer need to use back * add pipal (spoonman) * fix credcrack (bustedsec) * add spoopy-ng (bustedsec) * add nessus-parser (spoonman)...
View Articlecyber security incident response platform.
FIR (Fast Incident Response) is an cybersecurity incident management platform designed with agility and speed in mind. It allows for easy creation, tracking, and reporting of cybersecurity incidents....
View ArticleAntiFooling – Prevent the Malware Execution.
AntiFooling is a tool designed for preventing the Malware Execution. This is possible through the exploitation of the most common exceptions for Anti-Emulation and Anti-Debuging techniques used by the...
View ArticleFirewall kernel module.
The kernel module which implements 3 firewall rules as mentioned below: 1. Block all unsolicited ICMP packets coming in from outside except the ones going to the web-server. However,the local hosts...
View ArticleMaltrail is a malicious traffic detection system.
Latest changelog Maltrail v0.10.154: + Minor update related to the last commit. + Minor patch Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing...
View Articlenetdump – Remote collect configuration (dumps) from networked switches,...
netdump is a Remote collect configuration (dumps) from networked switches, routers, firewalls using expect php library Dependencies: + PHP and PHP Development Framework + (PHP Extension and Application...
View ArticleWalls of Fire – Universal firewall configuration generator.
Walls of Fire(wofgen) Universal firewall configuration generator wit easy to use ipfw, iptables, netsh, ipf/pf, ufw, wipfw, etc.. Dependencies: + C++ compiler + C++ STL Eveything but ipf/pf and wipfw...
View ArticleLynis v2.4.4 – is a system and security auditing tool for Unix/Linux.
Changelog Lynis v2.4.4 (2017-03-01): * Changes: + Fix for upload function to be used from profile + Reduce screen output for mail section, unless –verbose is used + Code cleanups and removed ‘update...
View ArticleAnomalyWebApplicationFirewall – an anomaly based web application firewall.
AnomalyWebApplicationFirewall is a script that used to unify access logs. The only prerequisites are that the nessesary parameters are logged and that all of the parameters are surrounded with double...
View Articletcpreplay is a suite of tools to edit and replay captured network traffic.
Tcpreplay is a suite of free Open Source utilities for editing and replaying previously captured network traffic. Originally designed to replay malicious traffic patterns to Intrusion...
View ArticlePyPortRedirector – TCP/IP to redirect all data from one address to another by...
PyPortRedirector is A simple Linux TCP client-server proxy able to redirect all data from one address to another by preserving source IP address written in Python. About The client can listen on one or...
View Articlelifer – A forensics tool for Windows link file examinations (i.e. Windows...
‘lifer‘ is a Windows or *nix command-line tool inspired by the whitepaper ‘The Meaning of Link Files in Forensic Examinations’ by Harry Parsonage and available here. It started life as a lightweight...
View ArticleSIP-DAS is a tool developed to simulate SIP-based DoS attacks.
SIP-DAS (DoS Attack Simulator) is a tool developed to simulate SIP-based DoS attacks. It has been developed to be used in academic work to help developing novel SIP-based DDoS attacks and defense...
View ArticleScutum is an ARP firewall that prevents your computer from being arp spoofed.
Scutum is an ARP firewall that prevents your computer from being arp spoofed. Scutum controls “arptables” in your computer so it accepts ARP packets only from the gateway. This way, when people with...
View ArticlePentest-Detections ~ WannaCry and Petya Fast Detection Tool.
Pentest-Detections is a Repository for penetration testing tools and Vulnerability scanner for MS17-010. Feature: + IPv4, IPv6 compatible. + IPv6 auto discover mode + Input range, file-list support +...
View Articleuserline – Query and report user logons relations from MS Windows Security...
userline is a tool automates the process of creating logon relations from MS Windows Security Events by showing a graphical relation among users domains, source and destination logons as well as...
View ArticleTROMMEL: Sift Through Directories of Files to Identify Indicators That May...
TROMMEL – sifts through directories of files to identify indicators that may contain vulnerabilities. TROMMEL identifies the following indicators related to: – Secure Shell (SSH) key files – Secure...
View Article