March 2006
F-Script
by xenomorph & 4 others (via)F-Script is a lightweight open-source scripting layer specifically designed for the Mac OS X object system (i.e. Cocoa). F-Script provides scripting and interactive access to Cocoa frameworks and custom Objective-C objects. It aims to be a useful and fun tool for both beginners and experts, allowing interactively exploring, testing and using Cocoa-based objects and frameworks.
October 2005
September 2005
Linux Exposed :: The Linux Security and Hacking Resource
by xenomorphGeneral | Hacking | Networking | Security
XSS-Proxy
by xenomorphXSS-Proxy is an advanced Cross-Site-Scripting (XSS) attack tool. The documents, tools and other content on this site assume you have a basic understanding of XSS issues and existing exploitation methods. If you are not famliar with XSS, then I recommend you check out the primer links/docs below to get a better of idea of what XSS is and how to detect it, fix it, and exploit it.
Discovering and Exploiting Named Pipe Security Flaws for Fun and Profit
by xenomorphSeveral named pipe security flaws have been discovered in recent years. However the technicalities involved in their discovery are widely unknown and undocumented. In fact, there isn't even a common terminology to define these security flaws. This paper will present a common terminology and define the intricacies of discovering and exploiting these security flaws. Past named pipe related vulnerabilities will be explored as well as areas in which vulnerabilities could be discovered in the future.
Chaosreader
by xenomorphA freeware tool to trace TCP/UDP/... sessions and fetch application data from snoop or tcpdump logs. This is a type of "any-snarf" program, as it will fetch telnet sessions, FTP files, HTTP transfers (HTML, GIF, JPEG, ...), SMTP emails, ... from the captured data inside network traffic logs.
Stripe Snoop ::
by xenomorphStripe Snoop is a suite of research tools that captures, modifies, validates, generates, analyzes, and shares data from magstripe cards. The data is captured through different hardware interfaces (or stdin), the contents decoded into the correct character set, and then a CDDB-like database attempts to figure out what the contents mean.
The Metasploit Project
by xenomorph & 1 otherThis is the Metasploit Project. The goal is to provide useful information to people who perform penetration testing, IDS signature development, and exploit research. This site was created to fill the gaps in the information publicly available on various exploitation techniques and to create a useful resource for exploit developers. The tools and information on this site are provided for legal penetration testing and research purposes only.
August 2005
ATK - Attack Tool Kit
by xenomorphThe Attack Tool Kit (ATK) is an open-source security scanner and exploiting framework
PHLAK :: [P]rofessional [H]acker's [L]inux [A]ssault [K]it - ::
by xenomorphPHLAK is a modular live security Linux distribution. PHLAK comes with two light gui's (fluxbox and XFCE4), many security tools, and a spiral notebook full of security documentation. PHLAK is a derivative of Morphix, created by Alex de Landgraaf.
Portable Linux Auditing CD
by xenomorph & 1 otherPLAC is a business card sized bootable cdrom running linux. It has network auditing, disk recovery, and forensic analysis tools. ISO will be avialable and scripts to roll you own cd.
Hakin9 Official Web Site
by xenomorphHakin9 Magazine:
Since the second issue onwards our magazine contains hakin9.live - a bootable distribution (based on Aurox Live) containing all the tools and materials needed for practising methods and techniques described in our articles.