Geoedge, is a little tool to help identify the location of an IP, via services like Maxmind and GeoIpTool.
It’s simple and can help you when you need to identify the source of an ip fast and from the commandline. Now it provides links to Google Maps and Mapquest, with the IP location.
Version 0.2 Links to Google Maps and Mapquest
More information: here
Home > Security Tools
Security Tools
-
Geoedge v0.2 - IP Location tool
16 February 2010, by Tools Tracker Team -
theHarvester v1.5 released
16 February 2010, by Tools Tracker TeamtheHarvester is a tool for gathering e-mail accounts from different public sources (search engines, pgp key servers). Is a really simple tool, but very effective.
Version 1.5 Fixed Bing search engine Fixed Linkedin
The sources supported are: Google - emails Bing search - emails Pgp servers - emails Linkedin - user names
Some examples:
Searching emails accounts for the domain microsoft.com, it will work with the first 500 google results:
./theharvester.py -d microsoft.com -l 500 -b (...) -
Bunkersix v1.0 - personal security control centre
16 February 2010, by Tools Tracker TeamBunkersix Security Console and Monitoring software provides personal Security Dashboards and Plugin Security Applications for Desktop and Mobile.
Security Dashboard Features The Console: The bunkersix web console enables you to monitor your security applications from both your desktop and on the go via your web enabled smart phone. The taskbar application Agent: Security alerts from your servers and workstations are transmitted from the Bunkersix Agent a taskbar application. Add new (...) -
SAINT v7.2.6 released
16 February 2010, by Tools Tracker TeamSAINT is the Security Administrator’s Integrated Network Tool. It is used to non-intrusively detect security vulnerabilities on any remote target, including servers, workstations, networking devices, and other types of nodes. It will also gather information such as operating system types and open ports. The SAINT graphical user interface provides access to SAINT’s data management, scan configuration, scan scheduling, and data analysis capabilities through a web browser. Different aspects of (...)
-
Medusa Parallel Network Login Auditor v2.0 released
16 February 2010, by Tools Tracker TeamMedusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible.
The author considers following items as some of the key features of this application: Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently. Flexible user input. Target information (host/user/password) can be specified in a variety of ways. For example, (...) -
NetReconn v1.76 released
12 February 2010, by Tools Tracker TeamA small set of tools based on previous reference programs and scripts. Currently consists of: tiny network strobe, sniffer and payload decoder.
These tools are not meant to replace current tools out there; they are designed to be small, fast and "do one thing well".
Version 1.76 Verification testing only -
OWASP Broken Web Applications v0.9 (Virtual Machine)
12 February 2010, by Tools Tracker TeamThe Open Web Application Security Project (OWASP) Broken Web Applications Project is distributed as a Virtual Machine in VMware format compatible with their no-cost VMware Player and VMware Server products (along with their commercial products).
Applications included
This project includes applications from various sources (listed in no particular order).
Intentionally Vulnerable Applications: OWASP WebGoat version 5.3-SNAPSHOT (Java) OWASP Vicnum version 1.3 (Perl) Mutillidae version 1.3 (...) -
WPA Rainbow Tables (Offensive Security)
12 February 2010, by Tools Tracker TeamFull list of torrents with WPA Rainbow Tables, from Offensive Security.
Each of the following links below are to a .torrent file which enables you to download a Cowpatty WPA Rainbow Table using BitTorrent. All of the tables are SSID specific and use a 49 million WPA optimised password dictionary file. Please take note that each of the tables is 1.9 GB in size.
The password file that was used to generate these lists can be found here. 101.wpa 130.wpa 188.wpa 2WIRE236.wpa 2WIRE631.wpa (...) -
SSL/TLS Audit version Alpha
11 February 2010, by Tools Tracker TeamSSL Audit scans web servers for SSL support, unlike other tools it is not limited to ciphers supported by SSL engines such as OpenSSL or NSS and can detect all known cipher suites over all SSL and TLS versions.
Apart from scanning available ciphersuites it has an interesting tidbit : The Fingerprint mode (Experimental). Included is an experimental fingerprint engine that tries to determine the SSL Engine used server side. It does so by sending normal and malformed SSL packets that can be (...) -
[PAPER] Reverse Honey Trap (SCHAP)
11 February 2010, by Tools Tracker TeamStriking Deep inside Online Web Antivirus Engines and Analyzers
Web based online anti viruses are used heavily for scanning malware files and providing the resultant output. There are number of online service providers which perform inline scanning of uploaded malware executables by the normal user or the victims. This process is based on the hierarchical functions and different steps opted to analyze the viruses and other worm activities. The infections occur dynamically when the (...)