Hyenae will no longer be under active development but will be continued under the name jHyenae (https://sourceforge.net/projects/jhyenae/)
I have created a short video tutorial for Hyenae/HyenaeFE, the video can be watched on YoutTube under: http://www.youtube.com/watch?v=FPagUMOzZEE
Hyenae 0.36-1 is out. This release contains several bug fixes, documentation updates and of course the long awaited HyenaeFE (a QT based frontend) support. The frontend is now part of all Hyenae binary package releases but also can be downloaded separately from its project page on SourceForge.net.
All upcoming binary package releases of Hyenae will include a copy of HyenaeFE. HyenaeFE is a QT based Hyenae frontend for Windows, Mac OS X and Linux.
Hyenae 0.35-3 is out. This release contains several bug fixes and an updated documentation. See the ChangeLog for more details.
Hyenae 0.35-2 is out. This release contains several bug fixes and an updated documentation. See the ChangeLog for more details.
sorry for the long pause, i've been through some very hard times but now Hyenae is under active development again.
Hyenae 0.35-1 is available for Maemo! Thanks to the awesome work of 'Linuxeventually' you can now download an ARMEL build Hyenae for Maemo Diablo. All additional prerequisites such as ARMEL builds of libpcap and libdnet can be found on our Sourceforge mirror as well.
Hyenae 0.35-1 is out. This release contains several bug fixes, code improvements and Cisco HSRP support. The attack assistant now features HSRP Active Router Hijacking. See the ChangeLog for more details.
Hyenae 0.35-1 is allmost finished an will be released on October 1st. Besides bug fixes and code refactoring this release will feature Cisco HSRP packet generation and HSRP Active Router Hijacking support. I also would like to announce that a new developer has joined the project to create a QT based GUI for Hyenae. Since Hyenaes HSRP support is quiete experimental you are encouraged to check out the latest revision from our SVN repository at SourceForge.net and see if it works for you. SourceForge.net. Another point of interest for you might be that i'm planing to publish a few Hyenae tutorial videos on SecurityTube within the coming months. Thats all for now!
Hyenae 0.34-1 is out. This release contains bug fixes, documentation updates and PPPoE-Discover support. The attack assistant now supports PPPoE PADI floods and blind PPPoE session termination. The network interface list now prints interface descriptions instead of names under Windows.
Vivek Ramachandran of SecurityTube created an awesome and very detailed tutorial video about Hyenae. Check out his awesome security site at: http://www.securitytube.net
Hyenae 0.33-1 is out. This release contains bug fixes and ICMPv6-Echo support was added.
Hyenae 0.32-1 is out. This version features DNS query support and the attack assistant was extended with the ability to setup DNS-Query floods. A randomization bug which occured on DHCP based attacks was fixed as well.
Whats the current state of development? What are my thoughts on upcoming features? Find out by following me on Twitter: http://twitter.com/sodhc_robin
Hyenae 0.32-1 will feature DNS query and response support but since the DNS protocol is a bit tricky to implement it will take some time to optimize the code.
Hyenae 0.31-1 is out. Besides a few bug fixes and documentation updates, the attack assistant was improved and TCP-Land attack support was added.
Hyenae was added to the Chaox Live CD which is a live environment based on Arch Linux focusing on pentesting and forensics. Find out more at: http://blag.chaox.net/
Hyenae 0.30-1 is out. Besides a few minor improvements to the actual attack code, Hyenae now features an interactive attack assistent. The idea behind the assistent is it to make Hyenae even usefull to unexperienced users or network administrators. Currently the attack assistent features a step-by-step setup for the following attack scenarios: ARP-Request flooding, ARP-Cache poisoning, ICMP-Echo flooding, ICMP based TCP-Connection resetting, TCP-SYN flooding, Blind TCP-Connection resetting, UDP flooding, DHCP-Discover flooding, DHCP starvation and DHCP-Release forcing.
Hyenae 0.29-1 is out. Besides minor code refactoring, Hyenae now supports TCP based ICMP "Destination Unreachable" packet generation.
Hyenae 0.28-1 is out. Besides documentation corrections and minor code refactoring, Hyenae now supports DHCP-Discover, Request and Release packet generation.
Hyenae 0.27-1 is out. Besides a lot of code refactoring and optimization, the new release package now also features a short HowTo and an improved documentation. The complete documentation was reviewed and improved by our new project member Siji Kurien.
The first public version (0.26-1) of Hyenae has been released today. Hyenae is a highly flexible and platform independent network packet generator. It allows you to reproduce low level ethernet attack scenarios (such as MITM, DoS and DDoS) to reveal the potential security vulnerabilities of your network. Besides smart wildcard-based address randomization and a highly customizable packet generation control, Hyenae comes with a clusterable remote daemon for setting up distributed attack networks. Besides the actual platform independend source code, there are also binary installation packages for Windows and Mac OS X available. Although Hyenae has reached a nearly stable development status, it is still in its beta phase and we need your feedback to weed out the last remaining bugs. If you have suggestions, questions or feature requests, you can get in touch by visiting our project page on SourceForge.net.
Hyenae is a highly flexible and platform independent network packet generator. It allows you to reproduce low level ethernet attack scenarios (such as MITM, DoS and DDoS) to reveal the potential security vulnerabilities of your network. Besides smart wildcard-based address randomization and a highly customizable packet generation control, Hyenae comes with a clusterable remote daemon for setting up distributed attack networks. The first public release of Hyenae will be on friday 30th.