August 2006
BackTrack - Remote-exploit.org
by xenomorph & 2 othersCombining the best features from both distributions, and paying special attention to small details, this is probably the best version of either distributions to ever come out.
Based on SLAX (Slackware), BackTrack provides user modularity. This means the distribution can be easily customised by the user to include personal scripts, additional tools, customised kernels, etc.
June 2006
Basic Analysis and Security Engine (BASE) -- Homepage
by xenomorph & 1 otherBasic Analysis and Security Engine (BASE) project
Ophcrack 2 -- The fastest Windows password cracker
by xenomorph & 14 othersA Windows password cracker based on the faster time-memory trade-off using rainbow tables. This is an evolution of the original Ophcrack 1.0 developed at EPFL. Ophrack 2.2 comes with a GTK Graphical User Interface and runs on Windows as well as on Linux.
Aanval Intrusion Detection Console - Snort and Syslog IDS / GUI / Interface
by xenomorphAanval is the industries only correlation and analysis console designed specifically for Snort and Syslog data.
February 2006
eVuln.com - Web Application Penetration Test Services.
by xenomorpheVuln provides the folowing services:
Web Application Source Code Analysis - Whitebox TestSecurity Implementation ConsultingWeb Application Remote Penetration Test - Blackbox TestIncident Response
January 2006
The Prefix WhoIs Project
by xenomorphThe Prefix WhoIs Project provides a whois-compatible client and server framework
for disclosing various up-to-date routing information. Instead of using registrar-originated
information (which is often unspecific or inaccurate), Prefix WhoIs uses the Internet's global
routing table as gleaned from a number of routing peers around the network.
ssldump
by xenomorphssldump is an SSLv3/TLS network protocol analyzer. It identifies TCP
connections on the chosen network interface and attempts to interpret
them as SSLv3/TLS traffic. When it identifies SSLv3/TLS traffic, it
decodes the records and displays them in a textual form to stdout. If
provided with the appropriate keying material, it will also decrypt
the connections and display the application data traffic.
WepLab Project Home Page
by xenomorph & 1 otherWepLab, analyzing WEP encryption security on wireless networks
September 2005
The Metasploit Project
by xenomorph & 1 otherThis is the Metasploit Project. The goal is to provide useful information to people who perform penetration testing, IDS signature development, and exploit research. This site was created to fill the gaps in the information publicly available on various exploitation techniques and to create a useful resource for exploit developers. The tools and information on this site are provided for legal penetration testing and research purposes only.
1
(14 marks)