Showing posts with label Security Tools. Show all posts
Showing posts with label Security Tools. Show all posts
Sunday, April 28, 2013
Denrit anonymous pentesting tool
DENRIT allows remote administration of anonymous networks (TOR, I2P and FreeNet). Also, contains a pentesting module to execute commands using a selected anonymous network, pentesting with TOR or TCP
Follows a client/server model with well-defined communication interfaces. SSH is used to allow remote clients to access the machine and manage any anonymous network that is installed there, plus allows penetration testing anonymously (or non-anonymously) using tools such as Metasploit Framework, nmap, nikto, among others. The list of supported applications will grow as the project progresses. Until now, this project is under development and is very unstable (and some features aren't included). But I've been developing constantly and I think that soon this software will become stable and very useful to pentesters, hackers and researchers (I hope so!)
Well, you can see the wiki page and the presentation exposed in the download section if you want more information about this project.
Download
Friday, March 29, 2013
Network Security Toolkit (NST)
Network Security Toolkit (NST) is a bootable ISO image (Live DVD) based
on Fedora 16 providing easy access to best-of-breed Open Source Network
Security Applications and should run on most x86/x86_64 platforms.
The main intent of developing this toolkit was to provide the network security administrator with a comprehensive set of Open Source Network Security Tools. The majority of tools published in the article: Top 125 Security Tools by INSECURE.ORG are available in the toolkit. An advanced Web User Interface (WUI) is provided for system/network administration, navigation, automation, geolocation and configuration of many network and security applications found within the NST distribution. In the virtual world, NST can be used as a network security analysis, validation and monitoring tool on enterprise virtual servers hosting virtual machines.
The main intent of developing this toolkit was to provide the network security administrator with a comprehensive set of Open Source Network Security Tools. The majority of tools published in the article: Top 125 Security Tools by INSECURE.ORG are available in the toolkit. An advanced Web User Interface (WUI) is provided for system/network administration, navigation, automation, geolocation and configuration of many network and security applications found within the NST distribution. In the virtual world, NST can be used as a network security analysis, validation and monitoring tool on enterprise virtual servers hosting virtual machines.
Features
- Multi-Tap Network Packet Capture
- Web-Based Network Security Tools Management
- Host/IPv4 Address Geolocation
- Network/System Monitoring
- Network Intrusion Detection
- Multi-Port Terminal Server
- VNC Session Management
- Network Interface Bandwidth Monitor
- Active Connections Monitor
- Network Segment ARP Scanner
- Network Packet Capture CloudShark Upload Support
Sunday, February 3, 2013
OSForensics V2.0 released - Digital investigation Tool
SForensics updated to version 2.0. OSForensics allows you to identify suspicious files and activity with hash matching, drive signature comparisons, e-mails, memory and binary data. It lets you extract forensic evidence from computers quickly with advanced file searching and indexing and enables this data to be managed effectively. New version having ability to capture pages from web sites and add them to a case and Support for multiple drives & folders when indexing, searching multiple set of index files in a single search, Faster search times of indexes (up to 500% faster) ,Much improved E-mail browser, Dozens of other improvements and bug fixes.
You can download the latest version of OSForensics here.
Tuesday, December 25, 2012
Fast Network cracker Hydra v 7.4 updated version download
Number one of the biggest security holes are passwords, as every password security holes shows. Hydra is a very fast logon cracker which supports numerous protocols to attack. THC-HYDRA is now updated to 7.4 version.
CHANGE LOG:
CHANGE LOG:
* New module: SSHKEY - for testing for ssh private keys (thanks to deadbyte(at)toucan-system(dot)com!)
* Added support for win8 and win2012 server to the RDP module
* Better target distribution if -M is used
* Added colored output (needs libcurses)
* Better library detection for current Cygwin and OS X
* Fixed the -W option
* Fixed a bug when the -e option was used without -u, -l, -L or -C, only half of the logins were tested
* Fixed HTTP Form module false positive when no answer was received from the server
* Fixed SMB module return code for invalid hours logon and LM auth disabled
* Fixed http-{get|post-form} from xhydra
* Added OS/390 mainframe 64bit support (thanks to dan(at)danny(dot)cz)
* Added limits to input files for -L, -P, -C and -M - people were using unhealthy large files! ;-)
* Added debug mode option to usage (thanks to Anold Black)
Wednesday, November 7, 2012
Cyb3r Sh3ll v1.0
cyb3r-sh3ll is a advanced PHP shell with some unique features like Cpanel Cracker , Port Scanner, Security Scanner, Proxy, Whois,Dictionary Maker, Hash Cracker etc. cyb3r-sh3ll is a hybrid version of all most powerfull shells. cyb3r-sh3ll has around 40 distinct features and yet to be updated in next versions. This shell has immense capabilities and have been written with some concepts and tools in mind, which are mostly required during penetration testing.
Features
- Platform Independent
- Shell
- Encoder (md5,crypt, sha1, crc32, url(encode/decode), base_64(encodr/decoder), dec2hex )
- Cracker (Hash, SMTP, POP3, IMAP, FTP, SNMP, MySQL, HTTP Form, HTTP Basic, Cpanel)
- Dictionary Maker
- Port Scanner
- NS Lookup
- Security Scanner
- List of Processes
- Full Server Info (CPU Info, Username, OS, Disk Drive Info, etc..)
- Automatic Exploit Searching
- Proxy
- WhoIs
- SQL Administration
- PHP Code Evaluater
- Mass Code Injector (Appender and Overwriter)
- PHP Obfuscator
- Web-Server Fuzzer
- Mass Mailer
- Mail Bomber (With Less Spam detection feature)
- Anonymous Mailer with Attachment
- PHP Safe Mode By-Passer
- PHP DOSer
- Good Design
- Secure Login
- Sites on Local Sever
- File Deletion
- Bind Shell
- Back Connect
- Rename Files
- Encoded Title
- Traceback (Email Alerts)
- Better Command Execution
- Lock Mode Customisation
- PHP Encoder/Decoder
- Anti-Crawler Feature
- Python & C Bind-Shell
- Self Remover
Hcon Security Testing Framework
HconSTF is Open Source Penetration Testing Framework based on different browser technologies, Which helps any security professional to assists in the Penetration testing or vulnerability scanning assessments.contains webtools which are powerful in doing xss(cross site scripting), Sql injection, siXSS, CSRF, Trace XSS, RFI, LFI, etc. Even useful to anybody interested in information security domain - students, Security Professionals,web developers, manual vulnerability assessments and much more.
Features
- Categorized and comprehensive toolset
- Contains hundreds of tools and features and script for different tasks like SQLi,XSS,Dorks,OSINT to name a few
- HconSTF webUI with online tools (same as the Aqua base version of HconSTF)
- Each and every option is configured for penetration testing and Vulnerability assessments
- Specially configured and enhanced for gaining easy & solid anonymity
- Works for web app testing assessments specially for owasp top 10
- Easy to use & collaborative Operating System like interface
- Multi-Language support (feature in heavy development translators needed)
Ani-Shell v1.5
Ani-Shell is a PHP remote shell, basically used for remote access and security pen testing. Ani-Shell provides a robust and a basic interface to access the file system, do some networking tweaks and even test your server for some common security vulnerabilities. The developer has tried to follow a coding standard which makes the code a little clean and easier to understand, Note: How you use this shell is exactly on you, and author pays no responsibility for what you use it for and what may be the consequences.
Features
- Shell
- Mass Mailer
- DDos
- Web-Server Fuzzer
- Uploader
- Design
- Login
- Mass Code Injector (Appender and Overwriter)
- Encoded Title
- Back Connect
- Bind Shell
- Lock Mode Customisable
- Tracebacks (email alerts)
- PHP Evaluate
- PHP MD5 Cracker
- Anti-Crawler
- Mass Deface
Sunday, November 4, 2012
SpoofTooph 0.5.2 - Automated Spoofing or Cloning Bluetooth Device
Spooftooph is designed to automate spoofing or cloning Bluetooth device information. Make a Bluetooth device hide in plain site.
Features
- Clone and log Bluetooth device information
- Generate a random new Bluetooth profile
- Change Bluetooth profile every X seconds
- Specify device information for Bluetooth interface
- Select device to clone from scan log
Saturday, November 3, 2012
Scylla v1 Penatration Testing Tool
When there's no technical vulnerability to exploit, you should try to hack what humans left for you, and believe me, this always works.
Scylla provides all the power of what a real audit, intrusion, exclusion and analysis tool needs, giving the possibility of scanning dynamically miss configuration bugs. Scylla try to be a better tool for security auditors, extremely faster, designed based on real scenarios, developed by experienced coders and constructed with the actual IT work methods. The words “Configuration Tracer” are the best definition for Scylla, a tool to help on IT audits.
This tool acts as a tool for unifying auditing techniques, in other words, it does what oscanner, winfingerprint, Hydra, DirBuster, and other tools do, and also what those tools don't do.
Supported Protocols
Scylla provides all the power of what a real audit, intrusion, exclusion and analysis tool needs, giving the possibility of scanning dynamically miss configuration bugs. Scylla try to be a better tool for security auditors, extremely faster, designed based on real scenarios, developed by experienced coders and constructed with the actual IT work methods. The words “Configuration Tracer” are the best definition for Scylla, a tool to help on IT audits.
This tool acts as a tool for unifying auditing techniques, in other words, it does what oscanner, winfingerprint, Hydra, DirBuster, and other tools do, and also what those tools don't do.
Supported Protocols
- Terminal (Telnet, SSH, telnets)
- FTP (FTPS, FTP, SFTP)
- SMB (Also Windows RPC)
- LDAP
- POP3 (POP3S)
- SMTP (SMTPS)
- IMAP
- MySql
- MSSQL
- Oracle (Database and TNS Listener)
- DB2 (Database and DAS)
- HTTP(HTTPS; Basic AUTH Brute Force, Digest AUTH Brute Force, Form Brute Force, Directory and files Brute Force)
- DNS (DNS snooping)
- Postgres SQL
Basic features:
- User, password list based Brute force
- Multiple hosts support
- Multiple session support
- Nmap integration
- Non-synchronized threads (proof to be a bit faster)
- Ability to restore sessions
- Session auto-saving (based on SQL Server CE)
- Easy to use
- Auto configured options
- Hacker oriented
- Free, and always free
- Database browser (who have hacked a DB and don’t have a DB client to connect to it- And worse if you don’t have internet)
- Open source tool
Burp Suite Free Edition v1.5
Burp Suite helps you secure your web applications by finding the vulnerabilities they contain. Burp Suite is an integrated platform for attacking web applications. It contains all of the Burp tools with numerous interfaces between them designed to facilitate and speed up the process of attacking an application. All tools share the same robust framework for handling HTTP requests, persistence, authentication, upstream proxies, logging, alerting and extensibility
Burp Suite allows you to combine manual and automated techniques to enumerate, analyse, scan, attack and exploit web applications. The various Burp tools work together effectively to share information and allow findings identified within one tool to form the basis of an attack using another.
Burp Suite allows you to combine manual and automated techniques to enumerate, analyse, scan, attack and exploit web applications. The various Burp tools work together effectively to share information and allow findings identified within one tool to form the basis of an attack using another.
User Interface:
- Burp's UI has been completely overhauled, to improve looks and usability:
- Fonts are now available throughout the UI, with corresponding resizing of all UI elements (tables, dialogs, buttons, etc.).
- There are configurable hotkeys for all common functions.
- Intruder and Repeater now have smart tabs, which you can drag to reorder, and click to create, close or rename.
- Tables are natively sortable everywhere, except where the row ordering is part of the options you are configuring.
- Text fields now have context-aware auto-complete memory.
Burp now implements sslstrip-style functionality, allowing you to use non-SSL-capable tools against HTTPS applications, or to perform active MITM attacks against users who begin browsing using HTTP.
Tuesday, October 30, 2012
Remotly Controlled Browser
Security researcher Zoltan Balazs has developed a remote-controlled piece of malware that functions as a browser extension and is competent of modifying Web pages, downloading and executing files, hijacking accounts, bypassing two-factor authentication security features enforced by some websites, and much more.
Balazs, who works as an IT security consultant for professional services firm Deloitte in Hungary, created the proof-of-concept malware in order to raise awareness about the security risks associated with browser extensions and as a call to the antivirus industry to take this type of threat more seriously.
The researcher plans to release the malware's source code on GitHub during a presentation at the Hacker Halted security conference in Miami next Tuesday, after having shared the code in advance with antivirus vendors.
There are known cases of cybercriminals using malicious browser extensions. For example, in May, the Wikimedia Foundation issued an alert about a Google Chrome extension that was inserting rogue ads into Wikipedia pages.
So far, cybercriminals have primarily used malicious browser extensions to perform click fraud by inserting rogue advertisements into websites or hijacking search queries. However, Balazs' project demonstrates that this type of malware could be used to launch far more serious attacks.
The researcher created versions of his proof-of-concept extension for Firefox, Chrome and Safari. A version for Internet Explorer might also be developed in the future, Balazs said on Wednesday.
The extension can be used to steal session cookies and even circumvent two-factor authentication systems like the one implemented by Google, the researcher said. This would allow attackers to hijack accounts on different websites.
The Firefox version can also: steal passwords from the browser's built-in password manager; download and execute files (only on Windows); modify the content of Web pages in the same way that banking Trojans modify online banking websites to hide rogue transaction records; take screen shots through the computer's webcam by accessing a Flash application hosted on a Web page; act as an HTTP proxy that allows an attacker to communicate with a server on the victim's internal network, and more.
The extension also works in Firefox for Android, where it loses some functionality because of the operating system's restrictions but gains some other capabilities like the ability to determine a device's geographical coordinates, Balazs said.
The Chrome version of the extension cannot be used to download, upload or execute files at the moment. "There are ways to do this, but I didn't have time to implement them yet," Balazs said.
However, Chrome's support for Native Client (NaCl), a sandboxing technology that allows Web applications to run C or C++ code inside the browser, can be leveraged by the Chrome extension to efficiently crack password hashes.
Tuesday, October 23, 2012
ZAproxy 1.4.1 Weekly updates
The OWASP Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.
It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing as well as being a useful addition to an experienced pen testers toolbox.
Some of Zap's Features
Intercepting Proxy
Active Scanner
Passive Scanner
Bruteforce Scanner
Spider
Fuzzer
Port Scanner
Dynamic SSL Certificates
API
Beanshell Integration
Download Zaproxy 1.4.1
Sunday, October 21, 2012
OhCrypt Encryption Tool Released
Friday, October 19, 2012
ModSecurity V2.7.0
ModSecurity is a web application firewall that can work either embedded or as a reverse proxy. It provides protection from a range of attacks against web applications and allows for HTTP traffic monitoring, logging and real-time analysis.
Arachni Version 0.4.1.1
Arachni scanner updated to version 0.4.1.1 Arachni is an Open Source, feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications. Arachni is smart, it trains itself by learning from the HTTP responses it receives during the audit process and is able to perform meta-analysis using a number of factors in order to correctly assess the trustworthiness of results and intelligently identify false-positives.
Unlike other scanners, it takes into account the dynamic nature of web applications, can detect changes caused while travelling through the paths of a web application's cyclomatic complexity and is able to adjust itself accordingly. This way attack/input vectors that would otherwise be undetectable by non-humans are seamlessly handled by Arachni.
Change log:
Auditor#log and Auditor#log_remote_file bugfixed to pass a Hash of the response headers instead of a String — also solving another bug causing response bodies not to be logged in the Issues. [Issue #294]
Issue — Response headers are now always Hash.
Reports
HTML — Removed response headers handling code and added the option to not include HTTP response bodies. [Issue #296]
XML — Removed response headers handling code and added the option to not include HTTP response bodies. [Issue #296]
HTTP debugging output now includes Response data. [Issue #297]
Executables
arachni_rpcd_monitor — Laxed standards enforced on the Dispatcher URL argument. [Issue #293]
Path extractors
Added path extractor for the area HTML tag (href attribute). [Issue #300]
Download Arachni version 0.4.1.1
Download Arachni Version 0.4.1.1
JSQL injection v2.0 Released
An easy to use SQL injection tool for retrieving database informations from a distant server.
jSQL Injection features:
jSQL Injection features:
- GET, POST, header, cookie methods
- normal, error based, blind, time based algorithms
- automatic best algorithms detection
- data retrieving progression
- proxy setting
- evasion
Ettercap 0.7.5 Released
Ettercap is a multipurpose sniffer/interceptor/logger for switched LAN. It supports active and passive dissection of many protocols (even ciphered ones) and includes many feature for network and host analysis.
Changes log:
Fix versioning, flags.
Need latest version of libnet that supports IPv6
Fix gtk crash.
Switched to git repo and CMAKE
Now that IPv6 is supported the cli requires an extra “/”. To poison all hosts in a broadcast domain the command would be /// (Instead of // // in past versions.)
Fixed Release tag and build flags, BZ 855504.
Fixed Obsoletes, BZ 855067.
Switch to git ettercap_rc branch for gtk crash, BZ 853791.
Dropped UI and daemon patches.
Merged subpackages, in part due to buildsystem change.
Spec cleanup.
Rebuilt for https ://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
Add hardened build.
libnet rebuild.
New upstream.
Rebuild against PCRE 8.30
Fix versioning, flags.
Need latest version of libnet that supports IPv6
Fix gtk crash.
Switched to git repo and CMAKE
Now that IPv6 is supported the cli requires an extra “/”. To poison all hosts in a broadcast domain the command would be /// (Instead of // // in past versions.)
Fixed Release tag and build flags, BZ 855504.
Fixed Obsoletes, BZ 855067.
Switch to git ettercap_rc branch for gtk crash, BZ 853791.
Dropped UI and daemon patches.
Merged subpackages, in part due to buildsystem change.
Spec cleanup.
Rebuilt for https ://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
Add hardened build.
libnet rebuild.
New upstream.
Rebuild against PCRE 8.30
WebSploit FrameWork 2.0.3
WebSploit is an open source project for scan and analysis Remote system from vulnerability.
WebSploit Is An Open Source Project For :
[>]Social Engineering Works
[>]Scan,Crawler & Analysis Web
[>]Automatic Exploiter
[>]Support Network Attacks
----
[+]Autopwn - Used From Metasploit For Scan and Exploit Target Service
[+]wmap - Scan,Crawler Target Used From Metasploit wmap plugin
[+]format infector - inject reverse & bind payload into file format
[+]phpmyadmin Scanner
[+]LFI Bypasser
[+]Apache Users Scanner
[+]Dir Bruter
[+]admin finder
[+]MLITM Attack - Man Left In The Middle, XSS Phishing Attacks
[+]MITM - Man In The Middle Attack
[+]Java Applet Attack
[+]MFOD Attack Vector
[+]USB Infection Attack
[+]ARP Dos Attack
[+]Web Killer Attack
[+]Fake Update Attack
[+]Fake Access point Attack
Download WebSploit 2.0.3
WebSploit Is An Open Source Project For :
[>]Social Engineering Works
[>]Scan,Crawler & Analysis Web
[>]Automatic Exploiter
[>]Support Network Attacks
----
[+]Autopwn - Used From Metasploit For Scan and Exploit Target Service
[+]wmap - Scan,Crawler Target Used From Metasploit wmap plugin
[+]format infector - inject reverse & bind payload into file format
[+]phpmyadmin Scanner
[+]LFI Bypasser
[+]Apache Users Scanner
[+]Dir Bruter
[+]admin finder
[+]MLITM Attack - Man Left In The Middle, XSS Phishing Attacks
[+]MITM - Man In The Middle Attack
[+]Java Applet Attack
[+]MFOD Attack Vector
[+]USB Infection Attack
[+]ARP Dos Attack
[+]Web Killer Attack
[+]Fake Update Attack
[+]Fake Access point Attack
Download WebSploit 2.0.3
Sunday, October 14, 2012
New THC attack tool targets Web servers using secure connections
THC the German based hacker’s have released a program they assert will allow a single computer to take down a Web server using a secure connection.
The THC-SSL-DOS tool, which was released 2 days before, purportedly exploits a flaw in SSL renegotiation protocol by overwhelming the system with multiple requests for secure connections. SSL renegotiation allows Web sites to create a new security key over an already established SSL connection.
A German group called as Hackers Choice said it released the exploit to bring attention to flaws in SSL, which allows sensitive data to flow between Web sites and an individual user's computer without being intercepted.
The exploit also works on servers that don't have SSL renegotiation enabled, the group said, but requires some modification and more computers. The group said the exploit will allow a single IBM laptop to take down the average server over a standard DSL connectionDownload
Wednesday, October 3, 2012
winAUTOPWN 3.2 Released
A complete list of all exploits in winautopwn is available inside misc\changelog.txt
a complete list of user interface changes is available in misci_changes.txt
Bsdautopwn has been compiled, like always for various flavours.a complete list of user interface changes is available in misci_changes.txt
The file bsd_install.sh can set chmod on all applicable bsd compiled binaries.
Winautopwn requires perl,php,python,ruby and its dependencies alongwith a few others too for smooth
working of exploits included in it.
A complete document explaining : how to use winautopwn/bsdautopwn, how to add your own exploits using welf (winautopwn exploit loading framework), other advanced command-line options and everything else related to windows.
DOWNLOAD
Subscribe to:
Posts (Atom)