FakeBO emulates a BackOrifice client (a trojan which can be used to
covertly monitor and alter Windows machines remotely), and can log
attempted commands and packets, as well as providing configurable
responses. Useful for catching script kiddies trying to find a hackable
Windows box, for providing evidence to their sysadmin, etc.
This is a fake IKE daemon supporting just enough of the standards and Cisco
extensions to attack commonly found insecure Cisco PSK+XAUTH VPN setups.
If you know the pre-shared key, also known as shared secret or group password,
you can impersonate the VPN gateway in IKE phase 1, and learn XAUTH user
credentials in phase 2.
chroot_safe, a tool to chroot any application in a sane manner without
requring binaries, shared libraries etc within the chroot or any support from
the application. Works with any dynamically linked application.
The tool is a simple flow-analyzing passive L7 fingerprinter. It
examines the sequence of client-server exchanges, their relative
layer 7 payload sizes, and transmission intervals (as opposed to
inspecting the contents, which is what most passive fingerprinters
and "smart" sniffers would do to analyze transmissions). This is
then matched against a database of traffic pattern signatures to
infer some interesting facts about the traffic.
"Fragroute intercepts, modifies, and rewrites egress traffic destined
for a specified host, implementing most of the attacks described in the
Secure Networks "Insertion, Evasion, and Denial of Service: Eluding
Network Intrusion Detection" paper of January 1998.
It features a simple ruleset language to delay, duplicate, drop,
fragment, overlap, print, reorder, segment, source-route, or otherwise
monkey with all outbound packets destined for a target host, with
minimal support for randomized or probabilistic behaviour.
This tool was written in good faith to aid in the testing of network
intrusion detection systems, firewalls, and basic TCP/IP stack
behaviour. Please do not abuse this software."
fswatch:
- is a utility to guard changes in a file system.
- is composed of three simple programs: fswbuild, fswcmp, fswshow. fswbuild
builds a file system information database. fswcmp compares two database files
and returns what changes a in file system have been introduced. fswshow shows
contents of database file. a file information database is platform
independent.
- can collect the following information about files (and directories): inode,
links, uid, gid, mode, size, flags, ctime, checksum (sha1) ; and can show
which files were added, deleted or changed.
- is one of many similar utilities. the main difference is the configuration.
you can define different settings for every directory in a directory tree.
moreover, it is very small and fast.
Fuzzdb is a comprehensive set of fuzzing patterns that can be used
during discovery or security testing of web applications.
Fwipe is a secure file erasing program. fwipe0, which actually erases
your files, is immune to filenames containing spaces, carriage returns,
dashes, or any other special characters. You can use it in place of rm
in cron jobs, together with "find ... -print0". The output of fwipe0 is
specially designed to be parsed easily by machine, so it can be embedded
in other applications which need secure file erasure.
This is a simple encryption tool to work with home-grown encryption
algorithms. It can run as either a GUI, a command-line application, or
a network proxy.
gnome-keyring-sharp is a fully managed implementation of libgnome-keyring.
When the gnome-keyring-daemon is running, you can use this to retrieve/store
confidential information such as passwords, notes or network services user
information.