RSS 14 projects tagged "hacking"

Download Website Updated 28 Jun 2012 sqlmap

Screenshot
Pop 218.87
Vit 4.93

sqlmap is a penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a detection engine, many niche features, and a broad range of switches including database fingerprinting, data fetching from the database, and accessing the underlying file system and executing commands on the operating system via out-of-band connections.

Download Website Updated 21 Jul 2010 irccgi

Screenshot
Pop 25.28
Vit 39.48

irccgi is a very simple IRC client that supports input from stdin and which converts IRC server messages into fake HTTP requests for its built-in CGI server.

No download No website Updated 21 Feb 2010 PRADS

Screenshot
Pop 42.19
Vit 38.96

PRADS is a "Passive Real-time Asset Detection System". It passively listens to network traffic and gathers information on hosts and services it sees. This information can be used to map your network, letting you know what services and hosts are alive and used. It can also be used together with your favorite IDS/IPS setup for "event to host/service" correlation. It can help you make sure that your inventory database is up to date. PRADS commes in two versions. One written in Perl, and one written in C. Some features might only be found in one of the versions.

No download Website Updated 21 May 2010 Net::Nessus::XMLRPC

Screenshot
Pop 27.93
Vit 2.29

Net::Nessus::XMLRPC is Perl interface for communication with the Nessus scanner over XMLRPC. It lets you start, stop, pause, and resume scans. It can display the progress and status of scans, download reports, etc.

No download No website Updated 16 May 2010 HackIt!

Screenshot
Pop 69.13
Vit 37.87

HackIt! is a strategic game where your goal is to control as many Web sites as you can by hacking them. It is played on an infinite map (the whole Web) where hackers struggle for the control of the Internet. The game involves scanning sites to know who they belong to, hacking your friends' favorite pages, or tracking them to kick them out of the net.

Download No website Updated 22 Feb 2013 HexInject

Screenshot
Pop 40.17
Vit 36.30

HexInject is a hexadecimal and raw packet injector and sniffer. It can be easily combined with other tools to provide a powerful command line framework for raw network access. It will automatically set the correct checksum (IP, TCP, UDP, ICMP).

Download No website Updated 10 Apr 2014 OWASP Zed Attack Proxy

Screenshot
Pop 383.62
Vit 47.91

OWASP Zed Attack Proxy (ZAP) is an easy-to-use integrated penetration testing tool for finding vulnerabilities in Web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing as well as being a useful addition to an experienced pen tester's toolbox. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.

Download No website Updated 16 Jan 2011 ipredirectd

Screenshot
Pop 28.04
Vit 35.45

ipredirectd has functionality similar to netcat but with some extra features. Multiple clients and full logging of network traffic are supported. It can also manipulate incoming and outgoing text traffic. Manipulation is based on pattern files that support regular expressions. This feature is probably most useful with HTTP. The software is smart enough not to apply regular expressions on non-HTML data by reading the content-type header. One possible usage is redistribution of pre-authenticated Web pages in foreign domains by replicating authentication and session cookies.

Download Website Updated 26 Sep 2011 Armitage

Screenshot
Pop 167.31
Vit 4.74

Armitage is a graphical cyber attack management tool for Metasploit that visualizes your targets, recommends exploits, and exposes the advanced capabilities of the framework. Armitage aims to make Metasploit usable for security practitioners who understand hacking but don't use Metasploit every day. If you want to learn Metasploit and grow into the advanced features, Armitage can help you.

Download Website Updated 08 Feb 2011 Bluepot

Screenshot
Pop 48.21
Vit 1.00

Bluepot is a Bluetooth honeypot. It is designed to accept and store any malware sent to it and to interact with common Bluetooth attacks such as “BlueBugging” and “BlueSnarfing”. Bluetooth connectivity is provided via hardware Bluetooth dongles. The system also allows monitoring of attacks via a graphical user interface that provides graphs, lists, a dashboard, and further detailed analysis from log files. The system is also highly configurable through said interface.

Screenshot

Project Spotlight

cwwav

A program to generate Morse code sound files from text.

Screenshot

Project Spotlight

YAGF

A graphical frontend for the Cuneiform OCR tool.