BackBox seamlessly integrates with network monitoring and NetOps platforms and automates configuration backups, restores, and change detection. BackBox also provides before and after config diffs for change management, and automated remediation of discovered network security issues.
This is mainly just an interface tweak. Added function of macaddress changer.
If you have problems getting the mac changer to work, try using a macaddress that starts with something other than "00" in the first octet.
If you are intersted in learning about network security please check out my Juniper Networks training course at: http://academy.gns3.com/courses/juniper-jncia-intro-to-junos
WATER (Wanted ACID/BASE To Emit Results) is a project to address some of the latency issues observed with BASE. Overall goal is to provide BASE like data with sub-second or near sub-second results for most basic queries.
This is a script. It's created to make WEP crack work easier. It depends on aircrack-ng and macchanger. However, if you don't want to change your MACaddress, macchanger is not essential.
Best-in-class automation, scalability, and single-pane IT management.
Don’t settle when it comes to managing your clients’ IT infrastructure. Exceed their expectations with ConnectWise RMM, our MSP RMM software that provides proactive tools and NOC services—regardless of device environment. With the number of new vulnerabilities rising each year, smart patching procedures have never been more important. We automatically test and deploy patches when they are viable and restrict patches that are harmful. Get better protection for clients while you spend less time managing endpoints and more time growing your business. It’s tough to locate, afford, and retain quality talent. In fact, 81% of IT leaders say it’s hard to find the recruits they need. Add ConnectWise RMM, NOC services and get the expertise and problem resolution you need to become the advisor your clients demand—without adding headcount.
Integrated vulnerability scanner and penetration testing software
Windows written in C#
SQL Server 2000/2005
Binary search blind and time-based extraction
Request headers
Post parameters
URL parameters
fgdump
advanced pivot technology.
A web application penetration testing tool that can extract data from SQL Server, MySQL, DB2, Oracle, Sybase, Informix, and Postgres. Further, it can crawl a website as a vulnerability scanner looking for sql injection vulnerabilities.
Zinas : Zinas Is Not A Scanner
a simple tool written in python to be used by penetration-testers
it can brute force FTP,TELNET and POP3 , and verify SMTP users, and fuzzes POP3 password field
This is an automated host name discovery tool written in Ruby. It is designed to discover as much as possible DNS names and application level host names related to a IP address. It's purpose is to enumerate all host names, aliases and virtual hosts.
For SaaS businesses to monetize payments through its turnkey PayFac-as-a-Service solution.
Exact Payments delivers easy-to-integrate embedded payment solutions enabling you to rapidly onboard merchants, instantly activate a variety of payment methods and accelerate your revenue — delivering an end-to-end payment processing platform for SaaS businesses.
Corazones Web Toolbox es una compilación de herramientas para realizar auditorías de seguridad informática. Entre sus herramientas incluye: | MAC spoofing | Admin panel Finder | Port scanner | MD5 multi search | Metasploit web launcher | etc...
It provides fast connections to Linux/Unix hosts over SSH protocol. You don't need to remember the IP address, hostname, login, or password. Just select server from the list and press "Connect".
Secure P2P Instant Messenger running on .NET Framework 2.0. Uses server to store user information (user name, password, email address, friends list, log in state, IP address) in encrypted form. Uses custom designed symmetric encryption algorithm.
Start Gemaad on a computer and it will :
- Create or complete a text file containing the computers MACaddress
- Set the WIFI card to DHCP mode
You can now simply copy this MACaddress to your admin console for any case of MACaddress filtering
Reaver is a network vulnerability scanner built on top of Nessus with an easy to use "web front-end" and reporting system. Reaver will aid administrators in identifying, cataloguing and remediation of security vulnerability...DEV -missing web interface
Portscan is a simple TCP port scanner (connect scan, similar to nmap -sC).
It is implemented with threads for better speed.
Please see the code and review it. Criticism is more than welcome.
Helps needed to make it robust.
Nayatel Intrusion Detection System is a windows based system written in C#. It Automatically detects any hosts attempting to intrude into your network. It shows the IP address and a level reading to show the level of threat it is posing.
DioNiSio is a DNS scanner written in ANSI C that only depends on sockets library and libc. It implements 3 scan methods (dictionary, massive reverse lookup and recursive zone transfers). Targeted to portability, rational resources usage, and easy use.
A Bluetooth penetration testing suite. It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack and has features such as Bluetooth address spoofing, an AT and a RFCOMM socket shell and a L2CAP packetgenerator.
The VAD tools are a set of scripts for working with Virtual Address Descriptor structures in dumps of Windows physical memory to provide detailed information about a process's memory allocations to a forensic investigator.