msfvenom shellcode generator/compiler/listenner
The script will use msfvenom (metasploit) to generate shellcode in diferent formats ( c | python | ruby | dll | msi | hta-psh ), injects the shellcode generated into one funtion (example: python) "the python funtion will execute the shellcode in ram" and uses compilers like: gcc (gnu cross compiler) or mingw32 or pyinstaller to build the executable file, also starts a multi-handler to recibe the remote connection (reverse shell or meterpreter session). -- 'shellcode generator' tool reproduces some of the technics used by Veil-Evasion framework, unicorn.py, powersploit, etc,etc,etc.."P.S. some payloads are undetectable by AV soluctions yes!!!" one of the reazons for that its the use of a funtion to execute the 2º stage of shell/meterpreter directly into targets ram.
Apache HTTPD Server is an open source web server packaged as a portable app, so you can run a full web server on your iPod, USB flash drive, portable hard drive, etc. It has all the same features as Apache HTTPD, plus, it leaves no personal information behind on the machine you run it on, so you can take it with you wherever you go.
ARP handler inspection
ArpON (ARP handler inspection) is a Host-based solution that make the ARP standardized protocol secure in order to avoid the Man In The Middle (MITM) attack through the ARP spoofing, ARP cache poisoning or ARP poison routing attack.
A DNS based malware protection
This is a Proof of Concept Technology for protecting End Users from malware, advanced threat and other malicious content by preventing DNS malicious Request/Responses. Considerations: Virtual Hardware Recommended (ALL Back-level Compatibility): - CPU Type: x86_64 (AMD64) - 4vCPUs - 8GB RAM - 40GB On demand Virtual Disk - Intel e1000 Virtual Network Interfaces (Mandatory) Components Used: PFSense 2.3.4-Patch1 - Suricata Module - Bind Module - Cron Module - Service Watchdog Module - SNORT Community Signature + Emerging Threats for constant update. - - Bring Your Own SNORT OINKCODE to get advanced rules. #CleanDNS Project: Because Detection is Cool but Proactivity is Better!
Windows Network Simulation tool for Malware Analysis
FakeNet is Windows network simulation tool designed for malware analysis. It redirects all traffic leaving a machine to the localhost (including hard-coded IP traffic and DNS traffic) and implements several protocols to ensure that malicious code continues to execute and can be observed by an analyst. The tool supports DNS, HTTP, and SSL protocols and provides a python extension interface for implementing new or custom protocols. It also the capability to listen for traffic to any port as well as create packet capture on the localhost. Right now the tool only supports WinXP Service Pack 3. The tool runs fine on Windows Vista/7 although certain features will be automatically disabled.
A simple TCP/UDP Port Flooder written in Python.
This is a simple Port Flooder written in Python 3.2 Use this tool to quickly stress test your network devices and measure your router's or server's load. Features are available in features section below. Moihack DoS Attack Tool was the name of the 1st version of the program. Moihack Port-Flooder is the Reloaded Version of the program with major code rewrite and changes. Code is much smaller in size now - from about 130 pure lines of codes to 35 lines only. To run it you must have Python 3.2 or newer installed.Tested this on Windows,but guess it will work in Linux also,since there are not any OS specific lines in the code. This tool was only written for personal tests and usage! It was NOT written to DDoS other people and/or cause harm to hardware.I am NOT responsible for any kind of damage you make by using this software. If you want to reach me, contact me at email@example.com
Airfox is a free and fast web browser. It uses the Gecko Engine.
Airfox is a fast, consistent, reliable, secure, private and independent web browser. Developed in the Microsoft .NET Runtime Environment, Airfox uses the Gecko Engine also seen in some well-known browsers such as Firefox, Waterfox, Pale Moon. Some advanced features such as Reliable Download Manager are not available due to restrictions from the GeckoFX runtime, but as seen from the results of the futuremark, acid 3 & acid 2 tests, Airfox’s scores/rankings are merit. We are just asking to support us by downloading Airfox and giving it a try. We promise that V2 will be just as good as the other famous browsers. We just want you to follow us on this journey. We want you to follow us on this quest. The quest for true browsing speed. The quest for an uncluttered web. The quest of YOUR ideal web . Download it at http://www.airfox.sourceforge.net
Fast, flexible and pragmatic, PHP powers everything from your blog to the most popular websites in the world. PHP Portable is packaged as a portable app, so you can run a full instance of PHP on your iPod, USB flash drive, portable hard drive, etc. It has all the same features as PHP, plus, it leaves no personal information behind on the machine you run it on, so you can take it with you wherever you go.
PHP-based anti-virus anti-trojan anti-malware solution.
A PHP script designed to detect trojans, viruses, malware and other threats within files uploaded to your system wherever the script is hooked, based on the signatures of ClamAV and others. Un PHP script pour la détection de virus, logiciels malveillants et autres menaces dans les fichiers téléchargés sur votre système partout où le script est accroché, basé sur les signatures de ClamAV et autres. Einem PHP-Script, um Trojaner, Viren, Malware und andere Bedrohungen in Dateien zu entdecken, die auf Ihr System hochgeladen werden könnten, welches die Signaturen von ClamAV und weitere nutzt. Uno PHP script progettato per la rilevazione di trojan, virus, malware e altre minacce all'interno di file caricati nel sistema ovunque lo script è collegato, basato su firme di ClamAV e altri.
Méthode d'analyse de risques
MEHARI est une méthode d'appréciation et de management des risques SI développée par le CLUSIF (Club de la Sécurité de l'Information Français). MEHARI est conforme aux exigences de la norme ISO/IEC 27005 pour la gestion des risques, et peut ainsi s'insérer dans une démarche ISO/IEC 27001.
Free Extracts Emails, Phones and custom text from Web using JAVA Regex
In Files there is WebCrawlerMySQL.jar which supports MySql Connection Please follow this link to get latest version https://sourceforge.net/projects/web-spider-web-crawler-extract/ Free Web Spider & Crawler. Extracts Information from Web by parsing millions of pages. Store data into Derby OR MySQL Database and data are not being lost after force closing the spider. - Free Web Spider , Parser, Extractor, Crawler - Extraction of Emails , Phones and Custom Text from Web - Export to Excel File - Data Saved into Derby Database - Written in Java Cross Platform See also Free Email Sender in this link: https://sourceforge.net/projects/gitst-free-email-ender/
Shodan - Automatic search for sites vulnerable to SQL injection, XSS injection LFI and RFI! Developed by Theone Lucas.
An encryption tool for creating file archives
CrococryptFile is a file encryption tool which creates encrypted archives of arbitrary files and folders. The encryption features of CrococryptFile can be compared to a ZIP utility that uses ZIP's AES encryption. However, there are significant differences. CrococryptFile... - encrypts all file and folder information including filenames, time/date and filesize information, - disguises any information of the archive's content, because all data and meta-data is simply integrated into a giant file dump. =Crypto Suites= For a full list of and details about supported crypto suites, please visit the CrococryptFile Homepage. Examples: - Password-based encryption (following PBKDF2) with AES-256, Twofish, Serpent, ... - Public key encryption using GPG/OpenPGP, Windows Keystore/CAPI with RSA/X.509 certificates - Cloaked (headerless) Password-based Encryption (AES-Twofish-256 cascaded) - ...
A Google chrome forensics tool
The Chromensics tool is developed to read all information from chrome browser directory and present it to user, in easy readable tabular format which can be explored in descent interface without running the chrome browser. The tool will also allow you retrieve information from other chrome installation brought from different machine for analyzing. The acquired artifacts can be exported in PDF report to present it in court of law or to superiors. -Update 04/02/2017- Standardized all date formats to YYYY-MM-DD HH:MM:SS Introduced Export to Excel Feature Added several search engines results under "Searches" Several Small bug fixes -Update- Now include debug capacity to generate debug logs. If users face any issue with tool, kindly attach cdb.log generated and send it to us. Fixed Cookie and Password Decryption Bug
Generates random fake names
Program generates as many fake names as you want in lots of different languages. Works in Linux, *BSD & Windows. Version 2.0x saves the names to a file called filenames.txt , which you can load into a text editor. Currently v2.0x is the Latest Version.
Fake command prompt to fool tech support scammers
For instructions on how to use, see this file: https://sourceforge.net/projects/techsupportcmd/files/How%20To%20Use.pdf/download This fake command prompt can be used instead of the real windows command prompt in order to waste the tech support scammers time. It is based upon the windows 7 command prompt, but is not noticeably different from the command prompt in most other windows versions. Many commands commonly used by scammers, such as tree, netstat and powercfg are emulated in this, but they provide results that the scammer would not be expecting, for example, the tree command draws an ASCII tree, while the powercfg command comes back with no errors, no warnings and no informational - every time, without fail. Commands not included all come back with the usual error as displayed for invalid commands in the real command prompt, however other commands can be added.
Plugin for KeePass Password Safe to logon on SAP systems
The KeePass Password Safe extension (plugin) enables you to logon at SAP systems (SAP GUI) by simply clicking on the password entry. See https://sourceforge.net/projects/keepass How it works: Simply add custom strings at each KeePass entry you want to use for SAP Logon. These custom strings will be recognized by the plugin: - SAP ID - SAP Client - SAP Language - SAP Transaction Filled properties "SAP ID" and "SAP Client" have to be present. Language and Transaction can be defined as default for all logons using the plugin configuration dialog. Make sure the "SAP Logon" column will be displayed, see KeePass settings. Note: SAP GUI must be installed and the path to sapshcut.exe (part of SAP GUI for Windows) must be configured by using the plugin config dialog. Prerequisites: - Windows 32/64bit - KeePass 2.29 or newer - SAP GUI 7.30 or newer
Open source voucher management / hotspot system
OpenVoucher is an open source voucher management / hotspot system for authenticating guests in your wifi or cable network. It is designed to be easy to use for anyone who wants to issue vouchers. For further information and installation how to's, see the project's homepage. The source code is maintained on Github.
repair corrupted pcap and pcapng files
this tool tries to repair your broken pcap and pcapng files by fixing the global header respectively packet blocks and recovering the packets by searching und guessing the packet headers or blocks
BTS Pentesting Lab - a deliberately vulnerable Web application
BTS PenTesting Lab is an open source vulnerable web application, created by Cyber Security & Privacy Foundation (www.cysecurity.org). It can be used to learn about many different types of web application vulnerabilities. Currently, the app contains the following types of vulnerabilities: *SQL Injection *XSS(includes Flash Based xss) *CSRF *Clickjacking *SSRF *File Inclusion * Code Execution *Insecure Direct Object Reference *Unrestricted File Upload vulnerability *Open URL Redirection *Server Side Includes(SSI) Injection and more... Java version of this application can be found here: https://sourceforge.net/p/javavulnerablelab/
Next Generation Open Source Firewall
Netdeep Secure is a Linux distribution with focus on network security. Is a Next Generation Open Source Firewall, which provides virtually all perimeter security features that your company may need. It offers Web content filters, ensuring better performance of the network, allowing users to use the service efficiently and securely, providing a deep control of the use of the Web access service, blocking access to unwanted websites, Virus, Spam, Applications and intrusion attempts. Its configuration is made entirely by the web interface.
Simple decoded Credit Card data parser
decoded data dumped from a magnetic stripe on the back of a credit card may be a little confusing to the average user. To make more sense of the data being displayed this simple parser can make any USB credit card reader user friendly.
Cryptographically-secure Random Number Generator.It is seeded with a 480-bit key and a 480-bit nonce. The target technology is a stream cipher. Each call to ::Invoke() returns a 32bit word. ( insert notes here about SALMON's operating speed ) SALMON uses a block cipher called SERPENT at the very end portion of its output. SERPENT was a finalist from the NIST selection tournaments. There is also mild use of a portion of Salsa20/12 called a "quarter round function". The key schedule relies on SHA-2 (the standard hash function of the NSA.)
MTS is a OpenSource Multi-protocol tester for IP-based protocol
MTS (Multi-protocol Test Suite) is a multi-protocol testing tool specially designed for telecom IP-based architectures (see above "Features" section for more details). MTS meets needs like : * Functional, non-regression or protocol tests => ‘Sequential’ mode * Load, performance endurance stress tests => ‘Parallel’ mode (master/slave) * Simulates equipment => client, server or both sides * System supervision => capture mode (like wireshark) Product characteristics : * Definition of tests case in XML files : test and scenarios input files * Graphical (very convivial) or command line (for test automation) user interfaces * Easy to use : logging management and rich statistics presentation. * Pure software solution => support only IP based protocol * Written in java => supports many famous platforms : Windows and Linux supported * Open Source product since begin 2012 with GPLV3 license => free to use
A header-only C++ library for accessing files in ELF binary format
ELFIO is a header-only C++ library intended for reading and generating files in the ELF binary format