Latest Exploits / Tools

Latest Exploits

Latest Tools

  • Mon, 22 May 2017 03:22:22 +0000: DAVOSET 1.3.3 - Security Tool Files ≈ Packet Storm
    DAVOSET is a tool for committing distributed denial of service attacks using execution on other sites.
  • Fri, 19 May 2017 05:02:22 +0000: Nixauditor CIS Script 1.1 - Security Tool Files ≈ Packet Storm
    Nixauditor is a script to audit linux and unix distributions based mainly on the CIS standards and universal linux hardening guidelines.
  • Thu, 18 May 2017 02:22:22 +0000: AntiRansom 3.02 - Security Tool Files ≈ Packet Storm
    AntiRansom is a tool capable of detecting and mitigating attacks of Ransomware using honeypots.
  • Thu, 18 May 2017 02:22:22 +0000: Mosca Analysis Tool 0.08 - Security Tool Files ≈ Packet Storm
    Mosca is a tool that checks code for poor security practices akin to using grep against it for static analysis.
  • Wed, 17 May 2017 04:53:58 +0000: Stegano 0.8.1 - Security Tool Files ≈ Packet Storm
    Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.
  • Tue, 16 May 2017 04:51:04 +0000: Falco 0.6.1 - Security Tool Files ≈ Packet Storm
    Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.
  • Tue, 16 May 2017 04:50:54 +0000: Payload Mask 0.2 - Security Tool Files ≈ Packet Storm
    Payload Mask is a payload editor that can mutate an initial dataset.
  • Tue, 16 May 2017 04:50:41 +0000: TOR Virtual Network Tunneling Tool 0.3.0.7 - Security Tool Files ≈ Packet Storm
    Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).
  • Mon, 08 May 2017 23:02:22 +0000: Stegano 0.8 - Security Tool Files ≈ Packet Storm
    Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.
  • Mon, 08 May 2017 14:44:44 +0000: Disable Intel AMT - Security Tool Files ≈ Packet Storm
    This is a tool written to disable Intel AMT on Windows.
  • Fri, 05 May 2017 23:44:44 +0000: Stegano 0.7.1 - Security Tool Files ≈ Packet Storm
    Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.
  • Fri, 05 May 2017 22:22:22 +0000: I2P 0.9.30 - Security Tool Files ≈ Packet Storm
    I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.
  • Thu, 04 May 2017 02:26:45 +0000: Hydra Network Logon Cracker 8.5 - Security Tool Files ≈ Packet Storm
    THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.
  • Thu, 04 May 2017 02:25:54 +0000: Lynis Auditing Tool 2.5.0 - Security Tool Files ≈ Packet Storm
    Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.
  • Mon, 01 May 2017 16:24:51 +0000: OpenStego Free Steganography Solution 0.7.1 - Security Tool Files ≈ Packet Storm
    OpenStego is a tool implemented in Java for generic steganography, with support for password-based encryption of the data. It supports plugins for various steganographic algorithms (currently, only Least Significant Bit algorithm is supported for images).
  • Thu, 27 Apr 2017 15:54:24 +0000: TOR Virtual Network Tunneling Tool 0.3.0.6 - Security Tool Files ≈ Packet Storm
    Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).
  • Wed, 26 Apr 2017 01:01:11 +0000: Uberscan Brute Forcing Tool - Security Tool Files ≈ Packet Storm
    Uberscan is an IP scanner and brute forcing tool all in one. Written in perl.
  • Fri, 21 Apr 2017 10:11:11 +0000: Thycotic Secret Server Data Decrypter - Security Tool Files ≈ Packet Storm
    This is a powershell script that decrypts the data stored within a Thycotic Secret Server.
  • Fri, 21 Apr 2017 03:33:33 +0000: DAVOSET 1.3.2 - Security Tool Files ≈ Packet Storm
    DAVOSET is a tool for committing distributed denial of service attacks using execution on other sites.
  • Thu, 20 Apr 2017 02:33:35 +0000: Packet Fence 7.0.0 - Security Tool Files ≈ Packet Storm
    PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

@Risk Exploits

ExploitDB