Flare-Emu : Easy To Use And Flexible Interface For Scripting Emulation Tasks

0

Flare-emu marries IDA Pro’s binary analysis capabilities with Unicorn’s emulation framework to provide the user with an easy to use and flexible interface for scripting emulation tasks. It is designed to handle all the housekeeping of setting up a flexible and robust emulator for its supported architectures so that you can focus on solving your code analysis problems. Currently,...

MemProcFS : The Memory Process File System

0

MemProcFS the Memory Process File System is an easy and convenient way of accessing physical memory as files a virtual file system. Easy trivial point and click memory analysis without the need for complicated commandline arguments! Access memory content and artifacts via files in a mounted virtual file system or via a feature rich application library to include in...

FDSploit : File Inclusion & Directory Traversal Fuzzing, Enumeration & Exploitation Tool

0

FDSploit is a file Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool. It can be used to discover and exploit Local/Remote File Inclusion and directory traversal vulnerabilities automatically. In case an LFI vulnerability is found, --lfishell option can be used to exploit it. For now, 3 different types of LFI shells are supported: Simple: This type of shell allows...

Rebel Framework : Penetration Testing Framework

0

Rebel framework is an advanced and easy to use penetration testing framework. Start git clone https://github.com/rebellionil/rebel-framework.git cd rebel-framework bash setup.sh bash rebel.sh Modules Screenshots Demos Supported Distributions DistributionVersion CheckSupportedDependencies already installedStatusKali Linux4.4.0yesyesworkingParrot OS4.14.0yesyesworking Also Read - SysAnalyzer : Automated Malcode Analysis System PORT YOUR OWN TOOLS TO REBEL ! scan.py ┌── └──╼ #python scan.py -h-h --help print usage usage ./scan.py controller.sh sample !/bin/bashnormal='e='e} arr='e} arr='e} arr='e} arr='e}...

Firmware Analysis Toolkit : To Emulate Firmware And Analyse It For Security Vulnerabilities

0

Firmware analysis toolkit is a toolkit to emulate firmware and analyse it for security vulnerabilities. FAT is a toolkit built in order to help security researchers analyze and identify vulnerabilities in IoT and embedded device firmware. Firmware Analysis Toolkit is build on top of the following existing tools and projects : Firmadyne Binwalk Firmware-Mod-Kit MITMproxy Firmwalker Setup instructions If you are...

Router Exploit Shovel : Automated Application Generation for Stack Overflow Types on Wireless Routers

0

Router Exploit Shovel is an automated application generation for stack overflow types on wireless Routers. It is an automated application generation tool for stack overflow types on wireless routers. The tool implements the key functions of exploits, it can adapt to the length of the data padding on the stack, generate the ROP chain, generate the encoded shellcode, and...

SKA : Simple Karma Attack

0

SKA allows you to implement a very simple and fast karma attack. You can sniff probe requests to choice the fake AP name or, if you want, you could insert manually the name of AP (evil twin attack). When target has connected to your WLAN you could active the HTTP redirection and perform a MITM attack. Details The script implements these steps: selection of...

ArmourBird CSF – Container Security Framework

0

ArmourBird CSF - Container Security Framework is an extensible, modular, API-first framework build for regular security monitoring of docker installations and containers against CIS and other custom security checks. ArmourBird CSF has a client-server architecture and is thus divided into two components: CSF Client This component is responsible for monitoring the docker installations, containers, and images on target machinesIn the initial release, it...

Tachyon : Fast Http Dead File Finder

0

Tachyon is a fast web application security reconnaissance tool. It is specifically meant to crawl web application and look for left over or non-indexed files with the addition of reporting pages or scripts leaking internal data. User Requirements Linux Python 3.5.2 User Installation Install $ mkdir tachyon $ python3 -m venv tachyon/ $ cd tachyon $ source bin/activate $ pip install tachyon3 $ tachyon...

Scout Suite : Multi-Cloud Security Auditing Tool

0

Scout Suite is an open source multi-cloud security-auditing tool, which enables security posture assessment of cloud environments. Using the APIs exposed by cloud providers, Scout Suite gathers configuration data for manual inspection and highlights risk areas. Rather than going through dozens of pages on the web consoles, Scout Suite presents a clear view of the attack surface automatically. Scout Suite...