Packages that are used to protect a user from malware & attacks from other users.
Tool count: 96
Name | Version | Description | Category | Website |
---|---|---|---|---|
aiengine | 1:2.0.1 | A packet inspection engine with capabilities of learning without any human intervention. | networking defensive | |
antiransom | 5 | A tool capable of detect and stop attacks of Ransomware using honeypots. | windows defensive honeypot | |
argon2 | 20190702 | The password hash Argon2, winner of PHC. | crypto defensive | |
argus | 3.0.8.2 | Network monitoring tool with flow control. | networking defensive sniffer | |
argus-clients | 3.0.8.2 | Network monitoring client for Argus. | networking defensive sniffer | |
arpalert | 1:2.0.12 | Monitor ARP changes in ethernet networks. | networking defensive | |
arpon | 2.7 | A portable handler daemon that make ARP protocol secure in order to avoid the Man In The Middle (MITM) attack through ARP Spoofing, ARP Cache Poisoning or ARP Poison Routing (APR) attacks. | defensive | |
arpstraw | 27.ab40e13 | Arp spoof detection tool. | defensive sniffer | |
artillery | 1:357.805a5d8 | A combination of a honeypot, file-system monitoring, system hardening, and overall health of a server to create a comprehensive way to secure a system. | defensive honeypot | |
artlas | 154.e5fdd8d | Apache Real Time Logs Analyzer System. | defensive | |
bamf-framework | 35.30d2b4b | A modular framework designed to be a platform to launch attacks against botnets. | malware defensive | |
beholder | 0.8.10 | A wireless intrusion detection tool that looks for anomalies in a wifi environment. | wireless defensive | |
bro | 2.6.4 | A powerful network analysis framework that is much different from the typical IDS you may know. | networking defensive sniffer | |
bro-aux | 451.a98acb8 | Handy auxiliary programs related to the use of the Bro Network Security Monitor (https://www.bro.org/). | networking defensive sniffer | |
camscan | 1.0057215 | A tool which will analyze the CAM table of Cisco switches to look for anamolies. | scanner networking defensive | |
centry | 72.6de2868 | Cold boot & DMA protection | misc defensive | |
chainsaw | v2.7.3.r6.g5d908fd | A powerful ‘first-response’ capability to quickly identify threats within Windows event logs. | defensive forensic windows | |
chkrootkit | 0.58b | Checks for rootkits on a system | defensive forensic | |
credmap | 116.d862247 | The Credential mapper - Tool that was created to bring awareness to the dangers of credential reuse. | misc defensive | |
dbpwaudit | 0.8 | A Java tool that allows you to perform online audits of password quality for several database engines. | cracker defensive | |
dependency-check | 10.0.2 | A tool that attempts to detect publicly disclosed vulnerabilities contained within a project's dependencies. | defensive, scanner | |
detect-sniffer | 159.a359262 | Tool that detects sniffers in the network. | defensive networking | |
epicwebhoneypot | 2.0a | Tool which aims to lure attackers using various types of web vulnerability scanners by tricking them into believing that they have found a vulnerability on a host. | webapp defensive honeypot | |
eraser | 6.2.0.2992 | Windows tool which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. | windows defensive | |
exabgp | 5239.76050379 | The BGP swiss army knife of networking. | networking defensive | |
exiv2 | 0.27.2 | Exif, Iptc and XMP metadata manipulation library and tools | forensic defensive | |
fastnetmon | v1.1.4.r62.g780aff3 | High performance DoS/DDoS load analyzer built on top of multiple packet capture engines. | defensive sniffer | |
fssb | 73.51d2ac2 | A low-level filesystem sandbox for Linux using syscall intercepts. | defensive | |
h2t | 36.9183a30 | Scans a website and suggests security headers to apply. | webapp scanner defensive | |
honeycreds | 26.eaeb401 | Network credential injection to detect responder and other network poisoners. | defensive | |
ifchk | 1.1.2 | A network interface promiscuous mode detection tool. | defensive networking | |
inetsim | 1.3.2 | A software suite for simulating common internet services in a lab environment, e.g. for analyzing the network behaviour of unknown malware samples. | defensive honeypot | |
jeopardize | 5.34f1d07 | A low(zero) cost threat intelligence & response tool against phishing domains. | defensive social | |
jhead | 3.08 | EXIF JPEG info parser and thumbnail remover | defensive | |
lorg | 98.aa4f1a3 | Apache Logfile Security Analyzer. | defensive | |
lunar | 884.0578751 | A UNIX security auditing tool based on several security frameworks. | scanner defensive | |
malcom | 708.02e55b9 | Analyze a system's network communication using graphical representations of network traffic. | networking defensive malware | |
malice | 0.3.28 | VirusTotal Wanna Be - Now with 100% more Hipster. | defensive misc | |
malmon | 0.3 | Hosting exploit/backdoor detection daemon. It's written in python, and uses inotify (pyinotify) to monitor file system activity. It checks files smaller then some size, compares their md5sum and hex signatures against DBs with known exploits/backdoor. | defensive malware | |
maltrail | 112260.8b9342f38d | Malicious traffic detection system. | defensive networking sniffer | |
malwareanalyser | 3.3 | A freeware tool to perform static and dynamic analysis on malware. | windows malware defensive reversing | |
mat | 0.6.1 | Metadata Anonymisation Toolkit composed of a GUI application, a CLI application and a library. | defensive misc | |
mat2 | 0.13.4 | A metadata removal tool, supporting a wide range of commonly used file formats. | defensive misc | |
mots | 5.34017ca | Man on the Side Attack - experimental packet injection and detection. | sniffer networking spoof defensive | |
munin-hashchecker | 239.95b046d | Online hash checker for Virustotal and other services | defensive forensic | |
nipe | 302.9e628df | A script to make Tor Network your default gateway. | defensive networking | |
nohidy | 67.22c1283 | The system admins best friend, multi platform auditing tool. | recon networking defensive | |
nsia | 1.0.6 | A website scanner that monitors websites in realtime in order to detect defacements, compliance violations, exploits, sensitive information disclosure and other issues. | scanner webapp defensive | |
nzyme | 1.2.2 | WiFi defense system. | wireless defensive | |
onionscan | 130.da42865 | Scan Onion Services for Security Issues. | scanner defensive | |
onionshare | 2.6.2 | Securely and anonymously share a file of any size. | misc defensive | |
openscap | 1.4.0.r12.g0ae322d43 | Open Source Security Compliance Solution. | automation defensive scanner | |
orjail | 200.ae38ba2 | A more secure way to force programs to exclusively use tor network. | defensive | |
osfooler-ng | 2.c0b20d6 | Prevents remote active/passive OS fingerprinting by tools like nmap or p0f. | defensive | |
perl-image-exiftool | 12.98 | Reader and rewriter of EXIF informations that supports raw files | forensic defensive | |
persistencesniper | v1.16.1.r1.gac4751a | Hunt persistences implanted in Windows machines. | defensive windows | |
phishingkithunter | 20.ac9bd1e | Find phishing kits which use your brand/organization's files and image. | social defensive | |
pidense | 29.ef26704 | Monitor illegal wireless network activities. (Fake Access Points) | wireless defensive | |
pmacct | 4281.db67590d | Small set of multi-purpose passive network monitoring tools [NetFlow IPFIX sFlow libpcap BGP BMP IGP Streaming Telemetry]. | networking sniffer defensive | |
pngcheck | 3.0.3 | Verifies the integrity of PNG, JNG and MNG files by checking the CRCs and decompressing the image data. | stego defensive forensic | |
polyswarm | 3.9.0 | An interface to the public and private PolySwarm APIs. | malware defensive | |
polyswarm-api | 0.5.3 | An interface to the public and private PolySwarm APIs. | malware defensive | |
portspoof | 149.c3f3c34 | This program's primary goal is to enhance OS security through a set of new techniques. | defensive spoof | |
promiscdetect | 1.0 | Checks if your network adapter(s) is running in promiscuous mode, which may be a sign that you have a sniffer running on your computer. | windows networking defensive | |
prowler | 1:4256.a6b10a861 | Tool for AWS security assessment, auditing and hardening. | defensive scanner | |
quicksand-lite | 33.c3edf92 | Command line tool for scanning streams within office documents plus xor db attack. | defensive | |
rkhunter | 1.4.6 | Checks machines for the presence of rootkits and other unwanted tools. | forensic defensive | |
sagan | 2.0.2 | A snort-like log analysis engine. | ids defensive | |
scap-security-guide | 0.1.60 | Security compliance content in SCAP, Bash, Ansible, and other formats. | automation defensive scanner | |
scap-workbench | 1.2.1 | SCAP Scanner And Tailoring Graphical User Interface. | automation defensive scanner | |
secure-delete | 1:1.b63d814 | Secure file, disk, swap, memory erasure utilities. | anti-forensic defensive | |
sentrypeer | v3.0.0.r14.g02173c8 | Protect SIP Servers from bad actors. | defensive | |
sigma | 0.20 | Generic Signature Format for SIEM Systems | defensive | |
sniffjoke | 772.434bfb1 | Injects packets in the transmission flow that are able to seriously disturb passive analysis like sniffing, interception and low level information theft. | defensive networking sniffer | |
snort | 2.9.20 | A lightweight network intrusion detection system. | defensive networking forensic | |
sooty | 335.6236fd1 | The SOC Analysts all-in-one CLI tool to automate and speed up workflow. | defensive recon social | |
stegdetect | 20.28a4f07 | An automated tool for detecting steganographic content in images. | stego defensive forensic | |
suricata | 6.0.20 | An Open Source Next Generation Intrusion Detection and Prevention Engine. | defensive | |
tabi | 13.068a406 | BGP Hijack Detection. | defensive networking | |
tfsec | v0.63.1.r401.g6444d311b | Security scanner for your Terraform code. | defensive scanner | |
threatspec | 0.5.0 | Project to integrate threat modelling into development process. | defensive misc | |
tor-autocircuit | 0.2 | Tor Autocircuit was developed to give users a finer control over Tor circuit creation. The tool exposes the functionality of TorCtl library which allows its users to control circuit length, speed, geolocation, and other parameters. | defensive | |
tor-browser | 13.5.6 | Tor Browser Bundle: anonymous browsing using Firefox and Tor. | defensive | |
tor-browser-en | 11.5.6 | Tor Browser Bundle: Anonymous browsing using firefox and tor | defensive | |
tor-router | 22.5b79c1c | A tool that allow you to make TOR your default gateway and send all internet connections under TOR (as transparent proxy) for increase privacy/anonymity without extra unnecessary code. | defensive | |
truecrypt | 1:7.1a | Free open-source cross-platform disk encryption software | blackarch defensive | |
tyton | 1:80.56494f3 | Kernel-Mode Rootkit Hunter. | defensive | |
usb-canary | 31.bb23552 | A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unplugging devices it can be configured to send you an SMS or alert you via Slack or Pushover. | defensive | |
veracrypt | 1.26.15 | Disk encryption with strong security based on TrueCrypt | crypto defensive | |
windowsspyblocker | 4.38.0 | Block spying and tracking on Windows. | windows defensive | |
wireless-ids | 24.b132071 | Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets. | wireless sniffer defensive | |
wordpot | 44.e96889b | A Wordpress Honeypot. | honeypot defensive | |
yeti | 3345.e4178a70 | A platform meant to organize observables, indicators of compromise, TTPs, and knowledge on threats in a single, unified repository. | defensive recon | |
zeek | 1:v7.1.0.dev.r384.g4656faed6 | Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. | networking defensive sniffer | |
zeek-aux | 692.e850412 | Handy auxiliary programs related to the use of the Zeek Network Security Monitor. | networking defensive sniffer | |
zeus | 111.97db152 | AWS Auditing & Hardening Tool. | defensive scanner |