Phrozen Keylogger Lite v1.0 download
Download Phrozen Keylogger Lite v1.0
Posted by Mohit Kumar at Saturday, March 09, 2013
Snort 2.9.4.1 - Network intrusion detection system
- Updated File processing for partial HTTP content and MIME attachments.
- Addition of new config option max_attribute_services_per_host and improve memory usage within attribute table.
- Handle excessive overlaps in frag3.
- Stream API updates to return session key for a session.
- Reduce false positives for TCP window slam events.
- Updates to provide better encoding for TCP packets generated for respond and react.
- Disable non-Ethernet decoders by default for performance reasons. If needed, use --enable-non-ether-decoders with configure.
Posted by Mohit Kumar at Monday, March 04, 2013
Unhide Forensic Tool, Find hidden processes and ports
- Compare /proc vs /bin/ps output
- Compare info gathered from /bin/ps with info gathered by walking thru the procfs. ONLY for Linux 2.6 version
- Compare info gathered from /bin/ps with info gathered from syscalls (syscall scanning).
- Full PIDs space ocupation (PIDs bruteforcing). ONLY for Linux 2.6 version
- Compare /bin/ps output vs /proc, procfs walking and syscall. ONLY for Linux 2.6 version
- Reverse search, verify that all thread seen by ps are also seen in the kernel.
- 6- Quick compare /proc, procfs walking and syscall vs /bin/ps output. ONLY for Linux 2.6 version.
- Unhide-TCP
unhide-tcp is a forensic tool that identifies TCP/UDP ports that are listening but are not listed in /bin/netstat through brute forcing of all TCP/UDP ports available.
- -f Write a log file (unhide.log) in the current directory.
- -h Display help
- -m Do more checks. As of 2010-11-21 version, this option has only effect for the procfs, procall, checkopendir and checkchdir tests.
- -r Use alternate version of sysinfo check in standard tests
- -V Show version and exit
- -v Be verbose, display warning message (default : don't display). This option may be repeated more than once.
gcc –static unhide.c -o unhide
gcc -Wall -O2 –static unhide-tcp.c -o unhide-tcp
gcc -Wall -O2 –static -pthread unhide-linux26.c -o unhide-linux26
gcc -Wall -O2 -static -o unhide_rb unhide_rb.c
Available for Windows & Linux Platform. Download latest Version : Windows or Linux
Posted by Mohit Kumar at Friday, February 15, 2013
Password Cracker Tool Hashkill version 0.3.1 released
Posted by Mohit Kumar at Friday, February 15, 2013
ExploitShield Browser Edition - Forget about browser vulnerabilities
Posted by Mohit Kumar at Sunday, November 04, 2012
JBoss Autopwn - JSP Hacking Tool For JBoss AS Server
Posted by Mohit Kumar at Saturday, November 03, 2012
TCHead - TrueCrypt Password Cracking Tool
Posted by Mohit Kumar at Monday, October 22, 2012
OWASP Zed Attack Proxy (ZAP) Weekly Releases
- Completely rewritten 'traditional' Spider (c/o Cosmin Stefan and the GSoC)
- New Ajax Spider (using Crawljax, c/o Guifre Ruiz and the GSoC)
- Web sockets support (c/o Robert Koch and the GSoC)
- Performance improvements (both speed and memory)
- Session awareness
- Authentication handling
- Contexts
- Modes (Safe, Protected and Standard)
- Online links in menu
Posted by Mohit Kumar at Monday, October 22, 2012
The Autopsy Forensic Browser v 3.0.0 released
Posted by Mohit Kumar at Wednesday, October 17, 2012
Nessus 5.0.2 vulnerability scanner updates
- UTF8 encoding problems would sometimes cause the generation of reports to fail
- Fixed a case where generating some compliance checks reports would cause the scanner to hang, using 100% of the CPU
- Resolved a resource leak issue occurring when a large number of different users are connected at the same time .
- Network congestion errors are now detected more conservatively
- Upgraded libxml2, libxslt, openssl to their newest versions
- Some nessusd.rules directives were not honored by the port scanners
- Solaris 10 build
Posted by Mohit Kumar at Tuesday, October 09, 2012
Volatility 2.2 Released - Introduced Linux support (Intel x86, x64)
- Current date, time, CPU count, CPU speed, service pack
- Current thread and idle thread
- Addresses of the KDBG, KPCR, DTB, PsActiveProcessHead, PsLoadedModuleList, etc
- List active processes (column or tree view)
- Scan for hidden or terminated _EPROCESS objects (using pool tags or _DISPATCHER_HEADER)
- Enumerate DLLs in the PEB LDR lists
- Rebuild/extract DLLs or EXEs to disk based on name, base address, or physical offset
- Print open handles to files, registry keys, mutexes, threads, processes, etc
- List security identifiers (SIDs) for processes
- Scan for cmd.exe command history and full console input/output buffers
- List process environment variables
- Print PE version information from processes or DLLs (file version, company name, etc)
- Enumerate imported and exported API functions anywhere in process or kernel memory
- Show a list of virtual and physical mappings of all pages available to a process
- Dump process address space to disk as a single file
- Analyze Virtual Address Descriptor (VAD) nodes, show page protection, flags, and mapped files
- Represent the VAD in tree form or Graphviz .dot graphs
- Dump each VAD range to disk for inspecting with external tools
- Parse XP/2003 event log records
- List loaded kernel modules and scan for hidden/unloaded module structures
- Extract PE files including drivers from anywhere in kernel memory
- Dump the SSDT for all 32- and 64-bit windows systems
- Scan for driver objects, print IRP major function tables
- Show devices and device tree layout
- Scan for file objects (can show deleted files, closed handles, etc)
- Scan for threads, mutex objects and symbolic links
- Analyze logon sessions and the processes and mapped images belonging to the session
- Scan for window stations and clipboard artifacts (clipboard snooping malware)
- Scan for desktops, analyze desktop heaps and attached GUI threads
- Locate and parse atom tables (class names, DLL injection paths, etc)
- Extract the contents of the windows clipboard
- Analyze message hooks and event hooks, show the injected DLL and function address
- Dump all USER object types, pool tags, and flags from the gahti
- Print all open USER handles, associated threads or processes, and object offsets
- Display details on all windows, such as coordiates, window title, class, procedure address, etc
- Take screen shots from memory dumps (requires PIL)
- Find injected code and DLLs, unpacker stubs, and decrypted configurations, etc
- Scan process or kernel memory for any string, regular expression, byte pattern, URL, etc
- Analyze services, their status (running, stopped, etc) and associated process or driver
- Cross-reference memory mapped executable files with PEB lists to find injected code
- Scan for imported functions in process or kernel memory (without using import tables)
- Detect API hooks (Inline, IAT, EAT), hooked winsock tables, syscall hooks, etc
- Analyze the IDT and GDT for each CPU, alert on hooks and disassemble code
- Dump details of threads, such as hardware breakpoints, context registers, etc
- Enumerate kernel callbacks for process creation, thread creation, and image loading
- Display FS registration, registry, shutdown, bugcheck, and debug print callbacks
- Detect hidden processes with alternate process listings (6+ sources)
- Analyze kernel timers and their DPC routine functions
- Walk the list of connection and socket objects for XP/2003 systems
- Scan physical memory for network information (recover closed/terminated artifacts)
- Determine if listening sockets are IPv4, IPv6, etc and link to their owning processes
- Scan for registry hives in memory
- Parse and print any value or key cached in kernel memory, with timestamps
- Dump an entire registry hive recursively
- Extract cached domain credentials from the registry
- Locate and decrypt NT/NTLM hashes and LSA secrets
- Analyze user assist keys, the shimcache, and shellbags
- Crash Dumps, Hibernation, Conversion
- Print crash dump and hibernation file header information
- Run any plugin on a crash dump or hibernation file (hiberfil.sys)
- Convert a raw memory dump to a crash dump for opening in !WinDBG
- Convert a crash dump or hibernation file to a raw memory dump
- Link strings found at physical offsets to their owning kernel address or process
- Interactive shell with disassembly, type display, hexdumps, etc
Posted by Mohit Kumar at Wednesday, October 03, 2012
Ra.2 - Blackbox DOM XSS Scanner Released
- False positive free by design: Vulnerable URLs are saved in DB, if and only if, our payload is executed successfully by the browser. Hence marked exploitable. If isn't false-positive, it's a bug! Report us :-)
- Large collection of injection vectors, includes “modified” R’Snake’s vectors as well.
- Supports transforming Unicode characters for testing content aware application.
- Automatically handles JavaScript obfuscation/compression, as it relies on native interpreter.
- Fast and light-weight.
- Pretty easy learning curve. Point-n-Click.
Posted by Mohit Kumar at Wednesday, October 03, 2012
winAUTOPWN v3.2 Released
Posted by Mohit Kumar at Tuesday, October 02, 2012
Rapid7 Tool Checks for MySQL Auth Bypass Vulnerability
Posted by Mohit Kumar at Thursday, September 20, 2012
Windows PowerShell V3.0 download available
- Windows 7 Service Pack 1 (32-bit & 64-bit)
- Windows Server 2008 R2 Service Pack 1 (64-bit only, includes Server Core)
- Windows Server 2008 Service Pack 2 (32-bit & 64-bit)
- Workflow : Windows PowerShell Workflow lets IT Pros and developers apply the benefits of workflows to the automation capabilities of Windows PowerShell. Workflows allow administrators to run long-running tasks (which can be made repeatable, frequent, parallelizable, interruptible, or restart-able) that can affect multiple managed computers or devices at the same time.
- Disconnected Sessions: PowerShell sessions can be disconnected from the remote computer and reconnected later from the same computer or a different computer without losing state or causing running commands to fail.
- Robust Session Connectivity: Remote sessions are resilient to network failures and will attempt to reconnect for several minutes. If connectivity cannot be reestablished, the session will automatically disconnect itself so that it can be reconnected when network connectivity is restored.
- Scheduled Jobs: scheduled jobs that run regularly or in response to an event.
- Delegated Administration: Commands that can be executed with a delegated set of credentials so users with limited permissions can run critical jobs
- Simplified Language Syntax: Simplified language syntax that make commands and scripts look a lot less like code and a lot more like natural language.
- Cmdlet Discovery: Improved cmdlet discovery and automatic module loading that make it easier to find and run any of the cmdlets installed on your computer.
- Show-Command: Show-Command, a cmdlet and ISE Add-On that helps users find the right cmdlet, view its parameters in a dialog box, and run it.
Posted by Mohit Kumar at Thursday, September 20, 2012
ZackAttack - Firesheep NTLM Authentication relaying
- The Rogue Servers - HTTP and SMB. These get the auth requests and keep recycling them
- The Clients - These connect to target servers and request NTLM creds from the Rogue Servers
- The Rules - Define auto actions to perform upon seeing a user.
- The Payloads - Methods to get users to autoauth with Integrated Windows Auth ergo not prompting the user for auth.
Posted by Mohit Kumar at Saturday, September 01, 2012
DiskCryptor - Encrypt your partitions
Posted by Mohit Kumar at Friday, August 31, 2012
Hideman - Free VPN service with mutliple server locations
Posted by Mohit Kumar at Friday, August 31, 2012
OWASP Security Shepherd 1.2 Released
- SQL Injection
- Cross Site Scripting
- Broken Authetication and Session Management
- Cross Site Rrequest Forgery
- Insecure Direct Object Reference
- Insecure Cryptographic Storage
- Failure to Restrict URL Access
- Unvalidated Redirects and Forwards
- Insufficient Transport Layer Security
Posted by Mohit Kumar at Friday, August 31, 2012
OllyDbg 2.01 Beta 2 Released
- Correct reaction on MOV SS,anything; PUSHF depending on the preceding comparison
- Correct reaction on disassembling of JE vs. JZ depending on the preceding comparison
- Eliminated nasty crashes that happened on some computers while invoking menu, or pressing ALT, or on similar harmless actions.
- Plugin interface is slightly extended. Plugin API includes more than 500 functions, structures and variables.
Posted by Mohit Kumar at Sunday, August 19, 2012