Maldet – Linux Malware Detect(LMD) v1.5.1-rc4.
Changelog maldet v1.5.1-rc4-git or stable version 8/1/2017: + [Change] hookscan.sh (modsec.sh) now checks for variable override file at conf.maldet.hookscan + [Fix] clam(d)scan was not respecting...
View Articlepev v0.80 – The PE file analysis toolkit.
pev is a multiplatform toolkit to work with PE (Portable Executable) binaries. Its main goal is to provide feature-rich tools for proper analyze binaries, specially the suspicious ones. Features: +...
View ArticleVuurmuur – is a powerful firewall manager built on top of iptables on Linux.
Latest change Vuurmuur v0.8rc2 11/1/2017: + common: unify into single project + conf: default to black background on new installs + debian: update and cleanup + common: turn vrmr_list_setup into void...
View Articlelunar – a unix security auditing tool and reporting.
Introduction: Lunar is a bash scripts for generates a scored audit report of a Unix host’s security. It is based on the CIS and other frameworks. Why a shell script? I wanted a tool that was able to...
View ArticleMaltrail is a malicious traffic detection system.
Latest changelog Maltrail v0.10.154: + Minor update related to the last commit. + Minor patch Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing...
View ArticleGlue is a swiss army knife of security analysis tools.
Glue is a framework for running a series of tools. Generally, it is intended as a backbone for automating a security analysis pipeline of tools. There are several ways to control which tools you want...
View Articleuif – Tool for generating optimized firewall rules.
The UIF project has been developed for a diskless router system and provides a mechanism to create and simplify packet filter rules. It forces you to provide names for every value you use in order to...
View Articlexwaf – automatic waf(web application firewall) bypass tool.
LEGAL DISCLAMER The author does not hold any responsibility about the bad use of this script, remember that attacking targets without prior concent its ilegal and punish by law, this script was build...
View ArticleUpPwn – A script that automate detection of security flaws on websites file...
UpPwn is a script that automate detection of security flaws on websites’ file upload systems. In some cases it also allows to exploit these vulnerabilities in order to upload malicious files....
View Articlenetdump – Remote collect configuration (dumps) from networked switches,...
netdump is a Remote collect configuration (dumps) from networked switches, routers, firewalls using expect php library Dependencies: + PHP and PHP Development Framework + (PHP Extension and Application...
View ArticleSUPERMAN – a secure framework suitability for wireless communication security.
The flexibility and mobility of Mobile Ad hoc Networks (MANETs) have made them increasing popular in a wide range of use cases. To protect these networks, security protocols have been developed to...
View Articlesmith – a very quick and very dirty client/server tool for testing firewall.
smith is a A client/server style agent meant for testing connectivity to and from a machine on a network, with Protocol support TCP/IP and UDP. two function: + Initiate a port-specific ping against a...
View Articlemtr – is a single network diagnostic tool.
What is MTR? mtr combines the functionality of the ‘traceroute’ and ‘ping’ programs in a single network diagnostic tool. As mtr starts, it investigates the network connection between the host mtr runs...
View ArticleGatecrasher – Network auditing and analysis tool.
Gatecrasher can be thought of as a subnet broadcast tool which records contactable host addresses and displays them to the user. Different protocols and ports can be used to contact potential hosts. 3...
View ArticleMaldet v1.6 – Linux Malware Detect(LMD).
Changelog maldet linux malware detect v1.6 27/1/2017: [New] added curated set of YARA webshell & malware signatures for use with ClamAV >= 0.99b [New] added cleaner rule ‘VistorTracker.Mob’...
View ArticleBONOMEN – Hunt for Malware Critical Process Impersonation.
How it works? The purpose of this tool is to detect process name impersonation using Damerau-Levenshtein algorithm. For example, a malware process could run under the name chr0me (note the 0 not o),...
View ArticleBigDataAudit – vulnerability detector for Hadoop and Spark.
BigDataAudit is a tool for detectiong the security problem of hadoop and spark configuration and encryption file. Function: + hadoop – check security configuration of hadoop + spark – check security...
View Articleshootback – a reverse TCP tunnel let you access target behind NAT or firewall.
Shootback is a reverse TCP tunnel let you access target behind NAT or firewall Reverse TCP tunnel, so that after the NAT or firewall network machines can be accessed by external networks. Consumes less...
View ArticleLynis v2.4.1 – is a system and security auditing tool for Unix/Linux.
Changelog Lynis 2.4.1 (2017-02-09): * Changes: + Generic code improvements + Improved the update check and display + Finish, Portuguese, and Turkish translation + Extended support and tests for...
View Articlewafpass – Analysing parameters with all payload bypass methods, aiming at...
Disclaimer: This tool is only for testing and academic purposes and can only be used where strict consent has been given. Do not use it for illegal purposes! wafpass banner WAFPASS Analysing parameters...
View Article