19 projects tagged "hacking"

Download No website Updated 21 May 2014 OWASP Zed Attack Proxy

Screenshot
Pop 459.31
Vit 53.05

OWASP Zed Attack Proxy (ZAP) is an easy-to-use integrated penetration testing tool for finding vulnerabilities in Web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing as well as being a useful addition to an experienced pen tester's toolbox. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.

Download Website Updated 21 Jul 2010 irccgi

Screenshot
Pop 28.46
Vit 39.98

irccgi is a very simple IRC client that supports input from stdin and which converts IRC server messages into fake HTTP requests for its built-in CGI server.

No download No website Updated 21 Feb 2010 PRADS

Screenshot
Pop 39.18
Vit 39.47

PRADS is a "Passive Real-time Asset Detection System". It passively listens to network traffic and gathers information on hosts and services it sees. This information can be used to map your network, letting you know what services and hosts are alive and used. It can also be used together with your favorite IDS/IPS setup for "event to host/service" correlation. It can help you make sure that your inventory database is up to date. PRADS commes in two versions. One written in Perl, and one written in C. Some features might only be found in one of the versions.

No download No website Updated 16 May 2010 HackIt!

Screenshot
Pop 66.95
Vit 38.39

HackIt! is a strategic game where your goal is to control as many Web sites as you can by hacking them. It is played on an infinite map (the whole Web) where hackers struggle for the control of the Internet. The game involves scanning sites to know who they belong to, hacking your friends' favorite pages, or tracking them to kick them out of the net.

Download No website Updated 22 Feb 2013 HexInject

Screenshot
Pop 39.19
Vit 36.84

HexInject is a hexadecimal and raw packet injector and sniffer. It can be easily combined with other tools to provide a powerful command line framework for raw network access. It will automatically set the correct checksum (IP, TCP, UDP, ICMP).

Download No website Updated 16 Jan 2011 ipredirectd

Screenshot
Pop 27.77
Vit 36.01

ipredirectd has functionality similar to netcat but with some extra features. Multiple clients and full logging of network traffic are supported. It can also manipulate incoming and outgoing text traffic. Manipulation is based on pattern files that support regular expressions. This feature is probably most useful with HTTP. The software is smart enough not to apply regular expressions on non-HTML data by reading the content-type header. One possible usage is redistribution of pre-authenticated Web pages in foreign domains by replicating authentication and session cookies.

No download No website Updated 31 Mar 2011 jHS

Screenshot
Pop 16.43
Vit 33.99

jHS (JavaScript Hacking Software) is a JavaScript debugging/hacking tool for the Firefox browser. It features many powerful tools but is still being developed.

Download No website Updated 05 Mar 2012 StopHack

Screenshot
Pop 41.67
Vit 28.62

StopHack is a simple to use and easy to install intrusion prevention system. It is fully adaptable and easily customized to your environment. It is built on top of proven bandwidth arbitration technology so the traffic passing through it won't be slowed down. Every packet is analyzed with regular expression-based behavior anomaly detection, and hackers are blocked immediately. It prevents reflected cross-site scripting, SQL injection, directory traversal, reflected URL redirects, login brute forcing, remote shell execution, and more.

Download Website Updated 23 Dec 2012 Username-Anarchy

Screenshot
Pop 16.88
Vit 22.87

Username-Anarchy is a commandline tool for the generation of usernames based on the users' real names. This is useful for user account/password brute force guessing and username enumeration when usernames are based on the users’ names. By attempting a few weak passwords across a large set of user accounts, user account lockout thresholds can be avoided. Common aliases (or self-chosen usernames) from forums are also included. Features include a plugin architecture, format string-style username formats, and substitutions. When only a first initial and lastname is known (LinkedIn lists users like this), it will attempt all possible first names, common first and last names from various countries (from Familypedia and PublicProfiler), and an exhaustive list of first and lastnames from Facebook. This also includes usernames scraped from forums, ordered by popularity.

No download No website Updated 12 Jan 2013 ARP Neighbor Cache Fingerprinter

Screenshot
Pop 14.28
Vit 22.41

ARP Neighbor Cache Fingerprinter is a tool that provides a mechanism for remote operating system detection by extrapolating characteristics of the target system's underlying neighbor cache and general ARP behavior. Given the non-existence of any standard specification for how the neighbor cache should behave, several differences in network stack implementations can be used for unique identification. The main disadvantage of this tool versus traditional fingerprinting is that because it's based on a Layer 2 protocol instead of a Layer 3 protocol, the target machine that is being tested must reside on the same Ethernet broadcast domain (usually the same physical network).

Screenshot

Project Spotlight

RealOpInsight

An advanced monitoring dashboard management engine for Nagios, Zabbix, and other open source monitoring software.

Screenshot

Project Spotlight

vifm

An ncurses file manager.