The Metasploit Framework
The Metasploit Framework is an open source platform that supports
vulnerability research, exploit development, and the creation of
custom security tools. The goal is to provide useful information
to people who perform penetration testing, IDS signature development,
and exploit research. This site was created to fill the gaps in the
information publicly available on various exploitation techniques
and to create a useful resource for exploit developers. The tools
and information on this site are provided for legal penetration
testing and research purposes only.
GoVPN is simple secure free software virtual private network daemon,
aimed to be reviewable, secure, DPI/censorship-resistant, written on Go.
It uses fast strong passphrase authenticated key agreement protocol with
augmented zero-knowledge mutual peers authentication (PAKE DH A-EKE).
Encrypted, authenticated data transport that hides message's length and
timestamps. Optional encryptionless mode, that still preserves data
confidentiality. Perfect forward secrecy property. Resistance to:
offline dictionary attacks, replay attacks, client's passphrases
compromising and dictionary attacks on the server side. Built-in
heartbeating, rehandshaking, real-time statistics. Ability to work
through UDP, TCP and HTTP proxies. IPv4/IPv6-compatibility.
The Open Vulnerability Assessment System (OpenVAS) is a framework of several
services and tools offering a comprehensive and powerful vulnerability
scanning and vulnerability management solution.
This package contains core libraries.
Snort is a libpcap-based packet sniffer/logger which can be used as a
lightweight network intrusion detection system. It features rules based logging
and can perform content searching/matching in addition to being used to detect
a variety of other attacks and probes, such as buffer overflows, stealth port
scans, CGI attacks, SMB probes, and much more. Snort has a real-time alerting
capability, with alerts being sent to syslog, a separate "alert" file, or even
to a Windows computer via Samba.
Packets are logged in their decoded form to directories which are generated
based upon the IP address of the remote peer. This allows Snort to be used as
a sort of "poor man's intrusion detection system" if you specify what traffic
you want to record and what to let through.
For instance, I use it to record traffic of interest to the six computers in
my office at work while I'm away on travel or gone for the weekend. It's
also nice for debugging network code since it shows you most of the Important
Stuff(TM) about your packets (as I see it anyway). The code is pretty easy
to modify to provide more complete packet decoding, so feel free to make
suggestions.
SnortSam is an intelligent agent that allows the popular
open-source Intrusion Detection System called Snort to block
intruding connections by reconfiguration of many firewalls
and Cisco devices.
SoftEther VPN ("SoftEther" means "Software Ethernet") is a powerful,
multi-OS and easy-to-use multi-protocol VPN software. It supports
SSL-VPN (HTTPS), as well as OpenVPN, IPsec, L2TP, MS-SSTP, L2TPv3
and EtherIP tunneling protocols and has a clone function to support
OpenVPN clients.
Not all web applications are built in the same ways, and hence, many
must be analyzed individually. SPIKE Proxy is a professional-grade
tool for looking for application-level vulnerabilities in web
applications. SPIKE Proxy covers the basics, such as SQL Injection and
cross-site-scripting, but it's completely open Python infrastructure
allows advanced users to customize it for web applications that other
tools fall apart on.
SpyBye is a tool to help web masters determine if their web pages
are hosting browser exploits that can infect visiting users with
malware. It functions as an HTTP proxy server and intercepts all
browser requests. SpyBye uses a few simple rules to determine if
embedded links on your web page are harmlesss, unknown or maybe
even dangerous.
SpyBye analyzes all downloads in the background and provides you
with a warning notification whenever it encounters content that
is potentially malicious. At that point, you can click on the link
in the notification and receive a more detailed analysis of the web page.
Libgcrypt is a general purpose crypto library based on the code used in GnuPG.
Free open-source disk encryption software
Main Features:
* Creates a virtual encrypted disk within a file and mounts it as
a real disk.
* Encrypts an entire partition or storage device such as USB flash
drive or hard drive.
* Encryption is automatic, real-time (on-the-fly) and transparent.
* Parallelization and pipelining allow data to be read and written
as fast as if the drive was not encrypted.
* Provides plausible deniability, in case an adversary forces you
to reveal the password:
Hidden volume (steganography) and hidden operating system.