Quantcast
Channel: Security Tools – Security List Network™
Browsing all 443 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Cuckoo Sandbox v-2.0-dev released : is an automated dynamic malware analysis...

Latest Change v-2.0 dev: – analyzer; cosmetic changes – conf; get rid of web.py and all occurences of the bottle library – requirements.txt; get rid of web.py and all occurences of the bottle library –...

View Article


Image may be NSFW.
Clik here to view.

Dnstwist v1.00 released.

Dnstwist is a tools for Generate and resolve domain variations to detect typo squatting, phishing and corporate espionage. Find similar-looking domains that adversaries can use to attack you. Can...

View Article


Image may be NSFW.
Clik here to view.

CPPPyScan – Quick and dirty regex scanner for dangerous C++ code.

CPPPyScan is a Quick and dirty regex scanner for dangerous C++ code. With optional arguments: -h, –help show this help message and exit -i, –infile File for all regex rules. Default is ‘rules.txt’ -r,...

View Article

Image may be NSFW.
Clik here to view.

cloudget v0.72 released – python script to bypass cloudflare from command line.

python script to bypass cloudflare from command line, with extensive scraping, link harvesting, and recursive directory downloading. built upon cfscrape module. python script to bypass cloudflare from...

View Article

Image may be NSFW.
Clik here to view.

Artillery v1.5 released : is a combination of a honeypot, monitoring tool,...

Artillery is a combination of a honeypot, monitoring tool, and alerting system. Eventually this will evolve into a hardening monitoring platform as well to detect insecure configurations from nix...

View Article


Image may be NSFW.
Clik here to view.

crsponse – Crypto Ransomware Response Tool.

Latest Update 11/5/2015: Updated for CryptoWall 4.0 Detection : Updates were made to detect files related to CryptoWall 4.0 that was just released. Also, the output directory name of files now includes...

View Article

Image may be NSFW.
Clik here to view.

Updates RATDecoders v-2015/11/8: Python Decoders for Common Remote Access...

changelog 2015/11/8: – Adzok Rat Config Extractor __description__ = ‘Adzok Rat Config Extractor’ __author__ = ‘Kevin Breen http://techanarchy.net http://malwareconfig.com’ __version__ = ‘0.2’ __date__...

View Article

Image may be NSFW.
Clik here to view.

Privesc is a Windows batch script that finds misconfiguration issues which...

Privesc is a Windows batch script that finds misconfiguration issues which can lead to privilege escalation. Privesc is a Windows batch script that finds misconfiguration issues which can lead to...

View Article


Image may be NSFW.
Clik here to view.

Process Dump v1.5 released ; Windows tool for dumping malware PE files from...

Windows reverse-engineering command-line tool to dump malware memory components back to disk for analysis. This is a common task for malware researchers who need to dump unpacked or injected code back...

View Article


Image may be NSFW.
Clik here to view.

Lynis v-2.1.5 : is a system and security auditing tool for Unix/Linux.

= Changelog Lynis 2.1.5 = This is an major release, which includes both new features and enhancements to existing tests. * Automation tools —————— CFEngine detection has been further extended....

View Article

Image may be NSFW.
Clik here to view.

sans – A simple anti-spoofing DNS server.

Simple Anti-spoofing Name Server, designed to defend against DNS spoofing, suitable for embedded devices and low end boxes. Latest Change 24/12/2015: + add homebrew build script. sans – A simple...

View Article

Image may be NSFW.
Clik here to view.

Helios is an all-in-one Java reverse engineering tool.

Helios is an all-in-one Java reverse engineering tool. It features integration with the latest up-to-date decompilers. There are several keybinds that can be used. To open a new file, simply use...

View Article

Image may be NSFW.
Clik here to view.

Vestigium is a proof of concept implementation of an application profiling...

Vestigium is a proof of concept implementation of an application profiling framework. The framework automates the detection of file system and Windows Registry entries. All digital artifacts associated...

View Article


Image may be NSFW.
Clik here to view.

Dnstwist v-1.02b ~ Generate & resolve domain variations to detect typo...

Latest change 2/1/2016: + dnstwist.py ; Added new feature: JSON output + Added another similar projects The idea is quite straightforward: dnstwist takes in your domain name as a seed, generates a list...

View Article

Image may be NSFW.
Clik here to view.

Fire – Custom LKM firewall passes packets to userland python script.

fire is custom firewall resides in kernel space and userspace Contains 2 components: + custom.ko — LKM (linux kernel module) + fire.py — Python script (run from user space) Custom.ko passes...

View Article


Image may be NSFW.
Clik here to view.

Stenographer is a full-packet-capture for intrusion detection & incident...

Stenographer is a full-packet-capture utility for buffering packets to disk for intrusion detection and incident response purposes. It provides a high-performance implementation of NIC-to-disk packet...

View Article

Image may be NSFW.
Clik here to view.

Joy – A package for capturing and analyzing for network research, forensics &...

Joy is A package for capturing and analyzing network flow data and intraflow data, for network research, forensics, and security monitoring. Overview: Joy is a BSD-licensed libpcap-based software...

View Article


Image may be NSFW.
Clik here to view.

Lynis v-2.1.8 : is a system and security auditing tool for Unix/Linux.

Changelog v2.1.8 10/1/2016: + New version, changed official author name and date + [AUTH-9234] Gather users on AIX, and rewriting of tests. * Networking + NETW-2600 collects IPv6 configuration and best...

View Article

Image may be NSFW.
Clik here to view.

python scripts that creates an outgoing-incoming ssh tunnel that can bypass...

python scripts that creates an outgoing-incoming ssh tunnel that can bypass some firewalls. Sometimes you want to access a system that is behind a firewall or NAT and you can’t open a port on them....

View Article

Image may be NSFW.
Clik here to view.

Climber – Check UNIX/Linux systems for privilege escalation.

Automated auditing tool to check UNIX/Linux systems misconfigurations which may allow local privilege escalation. Latest Change 28/1/2016:  Updated Exscript https://github.com/knipknap/exscript (Now...

View Article
Browsing all 443 articles
Browse latest View live