A Perl module wrapping libzxid. Also zxid.pl, that implements SP in
mod_perl environment, is supplied.
This module is also available on CPAN at http://search.cpan.org/dist/zxid/.
dsniff is a collection of tools for network auditing and penetration testing.
dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor
a network for interesting data (passwords, e-mail, files, etc.). arpspoof,
dnsspoof, and macof facilitate the interception of network traffic normally
unavailable to an attacker (e.g, due to layer-2 switching). sshmitm and webmitm
implement active monkey-in-the-middle attacks against redirected SSH and HTTPS
sessions by exploiting weak bindings in ad-hoc PKI.
Belier allows opening a shell or executing a command on a remote computer
through a SSH connection. The main feature of Belier is its ability to cross
several intermediate computers before realizing the job.
Binwalk is a tool for searching a given binary image for embedded
files and executable code. Specifically, it is designed for identifying
files and code embedded inside of firmware images. Binwalk uses the
libmagic library, so it is compatible with magic signatures created
for the Unix file utility.
Binwalk also includes a custom magic signature file which contains
improved signatures for files that are commonly found in firmware
images such as compressed/archived files, firmware headers, Linux
kernels, bootloaders, filesystems, etc.
More details are available at:
The BlindElephant Web Application Fingerprinter attempts to discover
the version of a (known) web application by comparing static files
at known locations against precomputed hashes for versions of those
files in all available releases. The technique is fast,
low-bandwidth, non-invasive, generic, and highly automatable.
Botan is a crypto library written in C++. It provides a variety of
cryptographic algorithms, including common ones such as AES, MD5, SHA,
HMAC, RSA, Diffie-Hellman, DSA, and ECDSA, as well as many others that
are more obscure or specialized. It also offers X.509v3 certificates
and CRLs, and PKCS #10 certificate requests. A message processing
system that uses a filter/pipeline metaphor allows for many common
cryptographic tasks to be completed with just a few lines of code.
Assembly optimizations for common CPUs, including x86, x86-64, and
PowerPC, offers further speedups for critical tasks such as SHA-1
hashing and multiple precision integer operations.
Botan is licensed under the same permissive terms as FreeBSD itself.
This is a PAM module for authenticating with MySQL.
This is a PHP library providing a wrapper to Colin Percival's scrypt
implementation. Scrypt is a key derivation function designed to be
far more secure against hardware brute-force attacks than alternative
functions such as PBKDF2 or bcrypt.
Bruteblock allows system administrators to block various bruteforce
attacks on UNIX services. The program analyzes system logs and adds
attacker's IP address into ipfw2 table effectively blocking them.
Addresses are automatically removed from the table after specified
amount of time. Bruteblock uses regular expressions to parse logs,
which provides flexibility allowing it to be used with almost any
network service. Bruteblock is written in pure C, doesn't use any
external programs and work with ipfw2 tables via raw sockets API.
PHP bindings to the libssh2 library which provide access to resources
(shell, remote exec, tunneling, file transfer) on a remote machine using a
secure cryptographic transport.