tgcd – TCP/IP Gender Changer Daemon utility.
tgcd is a simple Unix network utility to extend the accessibility of TCP/IP based network services beyond firewalls. This can also be used by network analysts and security experts for penetration...
View ArticleWalls of Fire – Universal firewall configuration generator.
Walls of Fire(wofgen) Universal firewall configuration generator wit easy to use ipfw, iptables, netsh, ipf/pf, ufw, wipfw, etc.. Dependencies: + C++ compiler + C++ STL Eveything but ipf/pf and wipfw...
View ArticleWily Possum – A firewall penetration testing tool suite.
Wily Possum – is a python and bash script for firewall penetration testing tool suite. Most of these tools and tests was a client/server model where the client is internal to the firewall and the...
View Articlearpstraw – arp spoofing detection tool.
arpstraw is an open source [MITM] detection tool that notify user when it detect an ArpSpoof attack. It rests on a config file arpstraw.cfg where you can specify each host you know in your network....
View Articleopensvp v0.5 – Firewall and application layer gateway testing tool.
Opensvp is a security tool implementing “attacks” to be able to test the resistance of firewall to protocol level attack. It implements classic attacks as well as some new kind of attacks against...
View ArticleIntelMQ is a solution for IT security teams for collecting and processing...
IntelMQ is a solution for IT security teams (CERTs, CSIRTs, abuse departments,…) for collecting and processing security feeds (such as log files) using a message queuing protocol. It’s a community...
View ArticleStalker – Threat Intel and Incident-Response.
Stalker is an Opensource threat intelligence from Zeus Tracker, Malc0de, Bambenek and Locky tracker will be collected and dumped it on a database. At the same time I’m also going to collect data from...
View Articlesnort v2.9.9.0 – a network intrusion detection and prevention system.
CHANGELOG SNORT V2990 2017-02-24: + Talos has added and modified multiple rules in the browser-ie, file-flash, file-other, indicator-obfuscation, indicator-shellcode and server-webapp rule sets to...
View Articlelinux-firewall-tool – Linux iptables automation tool.
linux-firewall-tool is managing iptables, ip6tables using ipsets. It is created to simplify the Linux firewall configuration at CERN IT Databases Group. It is intended to help SysAdmins that manage...
View ArticleLynis v2.4.4 – is a system and security auditing tool for Unix/Linux.
Changelog Lynis v2.4.4 (2017-03-01): * Changes: + Fix for upload function to be used from profile + Reduce screen output for mail section, unless –verbose is used + Code cleanups and removed ‘update...
View ArticleHijackThis fork 3 – A free utility that finds malware and other threats.
New on version 3 + Detecting several new hijacking methods + Full support of new OS + New and updated supplement tools + Improved interface + More securely HiJackThis Fork 3 is a tool for scanning your...
View Articlesquidmagic – analyze a web-based network traffic.
squidmagic is a tool designed to analyze a web-based network traffic to detect central command and control (C&C) servers and Malicious site, using Squid proxy server and Spamhaus. Dependencies: +...
View ArticleAnomalyWebApplicationFirewall – an anomaly based web application firewall.
AnomalyWebApplicationFirewall is a script that used to unify access logs. The only prerequisites are that the nessesary parameters are logged and that all of the parameters are surrounded with double...
View ArticleBluewall is a firewall framework designed for offensive and defensive cyber...
Bluewall is a firewall framework designed for offensive and defensive cyber professionals. This framework allows Cybersecurity professionals to quickly setup their environment while staying within...
View ArticleVulnerator – the vulnerability parsing utility.
The Mission Vulnerator has been designed to assist U.S. Department of Defense (DoD) cybersecurity analysts with the daunting task of consolidating vulnerability data from the numerous sources that have...
View ArticleLynis v2.4.5 – is a system and security auditing tool for Unix/Linux.
Changelog Lynis 2.4.5 (2017-03-09): Changes: + Allow host alias to be specified in profile + Code readability enhancements + Solaris support has been improved Tests: – AUTH-9328 – Add missing 0027 and...
View Articlepsad – the Port Scan Attack Detector.
The Port Scan Attack Detector psad is a lightweight system daemon written in is designed to work with Linux iptables/ip6tables/firewalld firewalling code to detect suspicious traffic such as port scans...
View Articlesimplify – Generic Android Deobfuscator.
Simplify virtually executes an app to understand its behavior and then tries to optimize the code so that it behaves identically but is easier for a human to understand. Each optimization type is...
View ArticleshARP – a tool to detect any ARP spoofing/MiTM incident.
shARP is an anti-ARP-spoofing application software and uses active scanning method to detect any ARP-spoofing incidents. Description: ARP spoofing allows an attacker to intercept data frames on a...
View ArticleTabi – BGP Hijacking Detection Tool.
TaBi is a framework that ease the detection of BGP IP prefixes conflicts, and their classification into BGP hijacking events. The term prefix hijacking refers to an event when an AS, called an...
View Article