Sort by new | name

Armory

Showing 46 - 60 of 88

Xprobe2

Written and maintained by Fyodor Yarochkin, Meder Kydyraliev and Ofir Arkin, Xprobe (I & II) is an active OS fingerprinting tools based on Ofir Arkin’s ICMP Usage In Scanning Research project.Xprobe is an alternative to some tools which are heavily dependent upon the usage of the TCP protocol for remote ...

Enumeration


fgdump

A successor to pwdump, fgdump can be used to dump user info from local and remote Windows boxes, given administrator privileges.

Enumeration


lsof

lsof is a Unix-specific diagnostic tool. Its name stands for LiSt Open Files, and it does just that. It lists information about any files that are open by processes currently running on the system. It can also list communications open by each process.

Enumeration System Monitoring


RainbowCrack

RainbowCrack is a general propose implementation of Philippe Oechslin's faster time-memory trade-off technique. In short, the RainbowCrack tool is a hash cracker. A traditional brute force cracker try all possible plaintexts one by one in cracking time. It is time consuming to break complex password in this way. The idea ...

Password Cracking


ike-scan

ike-scan is a command-line tool that uses the IKE protocol to discover, fingerprint and test IPsec VPN servers.

Enumeration Packet Analysis


arpwatch

arpwatch is an open-source software that monitors a computer network for ARP-activity. It generates a log of IP address-MAC address pairings along with a timestamp when the pairing appeared on the network. The first and foremost reason to monitor ARP activity is to detect ARP spoofing. It is developed by ...

Intrusion Detection Network Utilities System Monitoring


nemesis

Nemesis is a command-line network packet injection utility for UNIX-like and Windows systems. You might think of it as an EZ-bake packet oven or a manually controlled IP stack. With Nemesis, it is possible to generate and transmit packets from the command line or from within a shell script. Nemesis ...

Packet Crafting


KNOPPIX

KNOPPIX is a bootable Live system on CD or DVD, consisting of a representative collection of GNU/Linux software, automatic hardware detection, and support for many graphics cards, sound cards, SCSI and USB devices and other peripherals. KNOPPIX can be used as a productive Linux system for the desktop, educational CD, ...

Forensics Network Utilities System Monitoring


Yersinia

Yersinia is a network tool designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. Currently, there are some network protocols implemented, but others are coming (tell us which one is your preferred). ...

Exploitation Packet Crafting Spoofing


fragroute

fragroute intercepts, modifies, and rewrites egress traffic destined for the specified host, implementing most of the attacks described in the Secure Networks "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection'' paper of January 1998. Unlike fragrouter(8), this program only affects packets originating from the local machine destined for ...

Network Utilities Packet Crafting Vulnerability Scanning


socat

socat is a relay for bidirectional data transfer between two independent data channels. Each of these data channels may be a file, pipe, device (serial line etc. or a pseudo terminal), a socket (UNIX, IP4, IP6 - raw, UDP, TCP), an SSL socket, proxy CONNECT connection, a file descriptor (stdin ...

Network Utilities


chntpw

chntpw is an offline NT password and registry editor. It can be used to blank or reset passwords on Windows NT/2000/XP/2003 machines, as well as manipulate the registry. It is provided primarily as a boot CD image, but can also be installed on a permanent Linux system.

Forensics Password Cracking


nipper

Nipper processes network device configuration files, performs a security audit and outputs a security report with recommendations and a configuration report. Nipper supports a variety of devices from Cisco, Juniper, CheckPoint, Nortel and SonicWALL. Reports can be generated in HTML, XML, LaTeX, or plain text. Check out the online version ...

Vulnerability Scanning


EIGRP-tools

EIGRP-tools is a custom EIGRP packet generator and sniffer combined. It was developed to test the security and overall operation quality of the EIGRP routing protocol. Using this tool requires you to have the requisite background knowledge of EIGRP, packets structure/types, alongside a good working background of the Layer 3 ...

Exploitation Packet Analysis Packet Crafting


driftnet

Inspired by EtherPEG, Driftnet is a program which listens to network traffic and picks out images from TCP streams it observes. Fun to run on a host which sees lots of web traffic.

Network Monitoring Packet Analysis


Showing 46 - 60 of 88