Sentry - Bruteforce Attack Blocker (ssh, FTP, SMTP, and more)
Sentry detects and prevents bruteforce attacks against sshd using minimal system resources.SAFETo prevent inadvertant lockouts, Sentry manages a whitelist of IPs that have connected more than 3 times...
View ArticleUSBkill - Anti-Forensic Kill-Switch that waits for a change on your USB ports
USBkill is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.To run:sudo python usbkill.pyWhy?Some reasons to use this tool:In case...
View ArticleAntiCuckoo - A Tool to Detect and Crash Cuckoo Sandbox
A tool to detect and crash Cuckoo Sandbox. Tested in Cuckoo Sandbox Official and Accuvant's Cuckoo version.FeaturesDetection: Cuckoo hooks detection (all kind of cuckoo hooks).Suspicius data in own...
View ArticleCowrie - SSH Honeypot
Cowrie is a medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by the attacker.Cowrie is directly based on Kippo by Upi...
View ArticleNikto2 - Web Server Scanner
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated...
View ArticleBlackbone - Windows Memory Hacking Library
Blackbone, Windows Memory Hacking LibraryFeatures x86 and x64 supportProcess interactionManage PEB32/PEB64Manage process through WOW64 barrierProcess MemoryAllocate and free virtual memoryChange memory...
View ArticleBabun - A Windows shell you will love!
Would you like to use a linux-like console on a Windows host without a lot of fuzz? Try out babun!InstallationJust download the dist file from http://babun.github.io, unzip it and run the install.bat...
View ArticleQ-shell - Quick Shell for Unix Administrator
q-shell is quick shell for remote login into Unix system, it use blowfish crypt algorithm to protect transport data from client to server, you can get two program: 'qsh' for client, and 'qshd' for...
View ArticleJohnny - GUI for John the Ripper
Johnny is a cross-platform open-source GUI for the popular password cracker John the Ripper.Featuresuser could start, pause and resume attack (though only one session is allowed globally),all attack...
View ArticleSnitch - Information Gathering via dorks
Snitch is a tool which automate dorking process for specified domain. Using build-in dork categories, this tool helps gather informations about domain which can be found using search engines. It can be...
View ArticleyarGen - A Generator for Yara Rules (for malware researchers)
yarGen is a generator for Yara rules.What does yarGen do?The main principle is the creation of yara rules from strings found in malware files while removing all strings that also appear in goodware...
View ArticleMicEnum - Mandatory Integrity Control Enumerator for Windows
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines of...
View ArticleSIMP - System Integrity Management Platform
SIMP is a framework that aims to provide a reasonable combination of security compliance and operational flexibility.The ultimate goal of the project is to provide a complete management environment...
View ArticleBetterCap - A complete, modular, portable and easily extensible MITM framework
BetterCap is an attempt to create a complete, modular, portable and easily extensible MITM framework with every kind of features could be needed while performing a man in the middle attack. It's...
View ArticleKeyBox - A web-based SSH console that centrally manages administrative access...
KeyBox is a web-based SSH console that centrally manages administrative access to systems. Web-based administration is combined with management and distribution of user's public SSH keys. Key...
View ArticleDharma - A generation-based, context-free grammar fuzzer
A generation-based, context-free grammar fuzzer.RequirementsNoneExamplesGenerate a single test-case.% ./dharma.py -grammars grammars/webcrypto.dgGenerate a single test case with multiple grammars.%...
View ArticleEgress-Assess - Tool used to Test Egress Data Detection Capabilities
Egress-Assess is a tool used to test egress data detection capabilities.SetupTo setup, run the included setup script, or perform the following: Install pyftpdlib Generate a server certificate and store...
View ArticleLynis 2.1.1 - Security Auditing Tool for Unix/Linux Systems
Lynis is an open source security auditing tool. Commonly used by system administrators, security professionals and auditors, to evaluate the security defenses of their Linux/Unix based systems. It runs...
View ArticlePassgen - Random Character Generator Crunch to Crack WPA/WPA2
Passgen is an alternative for the random character generator crunch which attempts to solve cracking WPA/WPA2 keys by randomizing the output opposed to generating a list like so, (aaaaaaaa, aaaaaaab,...
View ArticleBackBox Linux 4.3 - Ubuntu-based Linux Distribution Penetration Test and...
BackBox is a Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments. Designed to be fast, easy to use and provide a minimal yet complete desktop...
View Article