GTScan – The Nmap Scanner for Telco

GTScan - The Nmap Scanner for Telco The Nmap Scanner for Telco. With the current focus on telecom security, there used tools in day to day IT side penetration testing should be extended to telecom as well. From here came the motivation for an nmap-like scanner but for telcoThe current security interconnect security controls might

Cr3dOv3r v0.3 – Know The Dangers Of Credential Reuse Attacks

Cr3dOv3r v0.3 - Know The Dangers Of Credential Reuse Attacks Your best friend in credential reuse attacks.Cr3dOv3r simply you give it an email then it does two simple jobs (but useful) :Search for public leaks for the email and if it any, it returns with all available details about the leak (Using hacked-emails site API).Now

Lynis 2.5.9 – Security Auditing Tool for Unix/Linux Systems

Lynis 2.5.9 - Security Auditing Tool for Unix/Linux Systems We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of Lynis. These changes are the next of simplification improvements we made. There is a risk of breaking your existing configuration.Lynis is an open source

OWASP-Nettacker – Automated Penetration Testing Framework

OWASP-Nettacker - Automated Penetration Testing Framework OWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software will utilize TCP SYN, ACK, ICMP and many other protocols in order to detect and bypass Firewall/IDS/IPS devices. By leveraging a

RFCrack – A Software Defined Radio Attack Tool

RFCrack - A Software Defined Radio Attack Tool RFCrack is my personal RF test bench, it was developed for testing RF communications between any physical device that communicates over sub Ghz frequencies. IoT devices, Cars, Alarm Systems etc... Testing was done with the Yardstick One on OSX,

DNSExfiltrator – Data exfiltration over DNS request covert channel

DNSExfiltrator - Data exfiltration over DNS request covert channel DNSExfiltrator allows for transfering (exfiltrate) a file over a DNS request covert channel. This is basically a data leak testing tool allowing to exfiltrate data over a covert channel.DNSExfiltrator has two sides:The server side, coming as a single python script (dnsexfiltrator.py), which acts as a custom

sdrtrunk – Tool For Decoding, Monitoring, Recording And Streaming Trunked Mobile And Related Radio Protocols Using Software Defined Radios (SDR)

sdrtrunk - Tool For Decoding, Monitoring, Recording And Streaming Trunked Mobile And Related Radio Protocols Using Software Defined Radios (SDR) A cross-platform java application for decoding, monitoring, recording and streaming trunked mobile and related radio protocols using Software Defined Radios (SDR).Getting StartedUser's Manual Version 0.3.0DownloadSupportFigure 1: sdrtrunk Version 0.3.0 Application ScreenshotEnd User Instructions:Install Java 8

ACE – Automated, Collection, and Enrichment Platform

ACE - Automated, Collection, and Enrichment Platform The Automated Collection and Enrichment (ACE) platform is a suite of tools for threat hunters to collect data from many endpoints in a network and automatically enrich the data. The data is collected by running scripts on each computer without installing any software on the target. ACE supports

Salamandra – Spy Microphone Detection Tool

Salamandra - Spy Microphone Detection Tool Salamandra is a tool to detect and locate spy microphones in closed environments. It find microphones based on the strength of the signal sent by the microphone and the amount of noise and overlapped frequencies. Based on the generated noise it can estimate how close or far away you