RSS 15 projects tagged "hacking"

Download Website Updated 28 Jun 2012 sqlmap

Screenshot
Pop 220.50
Vit 4.93

sqlmap is a penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a detection engine, many niche features, and a broad range of switches including database fingerprinting, data fetching from the database, and accessing the underlying file system and executing commands on the operating system via out-of-band connections.

Download Website Updated 09 Mar 2010 geoipgen

Screenshot
Pop 43.78
Vit 1.53

geoipgen is an IP network tool for generating geotargeted lists of IP addresses using MaxMind's GeoLite Country database. It can randomly enumerate all IP addresses or a specified number of IP addresses in a particular country or a list of countries. For example, to get all IPs for Japan in a random order, use "geoipgen jp". For a sample of 10,000 IPs from Australia and New Zealand, use "geoipgen -n 10000 au nz".

Download Website Updated 08 Mar 2010 nessus-xmlrpc

Screenshot
Pop 33.08
Vit 1.42

nessus-xmlrpc is a Ruby library for the Nessus XML-RPC interface. You can use it to start, stop, pause, and resume scans. It lets you watch progress and status of scans, download reports, etc. It comes with an example command line program that shows how easy it is to interact with the Nessus scanner.

No download Website Updated 21 May 2010 Net::Nessus::XMLRPC

Screenshot
Pop 28.21
Vit 2.29

Net::Nessus::XMLRPC is Perl interface for communication with the Nessus scanner over XMLRPC. It lets you start, stop, pause, and resume scans. It can display the progress and status of scans, download reports, etc.

Download Website Updated 05 Apr 2011 WhatWeb

Screenshot
Pop 111.09
Vit 3.06

WhatWeb identifies Websites. Its goal is to answer the question, “What is that Website?”. WhatWeb recognizes Web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, Web servers, and embedded devices. WhatWeb has over 900 plugins, each to recognize something different. It also identifies version numbers, email addresses, account IDs, Web framework modules, SQL errors, and more. It can be stealthy and fast, or thorough but slow. It supports an aggression level to control the trade off between speed and reliability.

No download No website Updated 02 Apr 2013 RubyDNS

Screenshot
Pop 21.56
Vit 1.95

RubyDNS is a high-performance DNS server that can be easily integrated into other projects or used as a stand-alone daemon (via RExec). By default, it uses rule-based pattern matching. Results can be hard-coded, computed, fetched from a remote DNS server, or fetched from a local cache, depending on requirements. In addition, RubyDNS includes a high-performance asynchronous DNS resolver built on top of EventMachine. This module can be used by itself in client applications without using the full RubyDNS server stack.

No download No website Updated 16 May 2010 HackIt!

Screenshot
Pop 69.00
Vit 37.89

HackIt! is a strategic game where your goal is to control as many Web sites as you can by hacking them. It is played on an infinite map (the whole Web) where hackers struggle for the control of the Internet. The game involves scanning sites to know who they belong to, hacking your friends' favorite pages, or tracking them to kick them out of the net.

Download No website Updated 10 Apr 2014 OWASP Zed Attack Proxy

Screenshot
Pop 384.50
Vit 43.16

OWASP Zed Attack Proxy (ZAP) is an easy-to-use integrated penetration testing tool for finding vulnerabilities in Web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing as well as being a useful addition to an experienced pen tester's toolbox. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.

Download Website Updated 26 Sep 2011 Armitage

Screenshot
Pop 166.80
Vit 4.74

Armitage is a graphical cyber attack management tool for Metasploit that visualizes your targets, recommends exploits, and exposes the advanced capabilities of the framework. Armitage aims to make Metasploit usable for security practitioners who understand hacking but don't use Metasploit every day. If you want to learn Metasploit and grow into the advanced features, Armitage can help you.

Download Website Updated 08 Feb 2011 Bluepot

Screenshot
Pop 48.54
Vit 1.00

Bluepot is a Bluetooth honeypot. It is designed to accept and store any malware sent to it and to interact with common Bluetooth attacks such as “BlueBugging” and “BlueSnarfing”. Bluetooth connectivity is provided via hardware Bluetooth dongles. The system also allows monitoring of attacks via a graphical user interface that provides graphs, lists, a dashboard, and further detailed analysis from log files. The system is also highly configurable through said interface.

Screenshot

Project Spotlight

PHP Server Monitor

A tool to monitor your servers and websites.

Screenshot

Project Spotlight

OAQL Server

An Oriented Architecture Query Language Server.