[Updated] lm2ntcrack v1.0 instant hash cracker released
lm2ntcrack provides a simple way to crack instantly Microsoft Windows NT Hash (MD4) when the LM Password is known. This sofware is entirely written in Perl, so it’s easily ported and installed on many boxes.
Kon-Boot "root a box" on the fly .. it’s a kind of magic !
Kon-Boot is an prototype piece of software which allows to change contents of a linux kernel (and now Windows kernel also!!!) on the fly (while booting). In the current compilation state it allows to log into a linux system as ’root’ user without typing the correct password or to elevate privileges from current user to root.
[CONFIRMED] : WinAutopwn website is infected
We have talked about a cool tool called winAutoPwn. This utility compiles the latest windows "exploits" oriented and perform an aggressive "autoexploitation" attack. But since today and during our "Tools Update Process", we have identified a threat on the website.
UCSniff updated to v2.1
UCSniff is an exciting new VoIP Security Assessment tool that leverages existing open source software into several useful features, allowing VoIP owners and security professionals to rapidly test for the threat of unauthorized VoIP and Video Eavesdropping. Written in C, and initially released for Linux systems, the software is freely available for anyone to download, under the GPLv3 license
SpiceWorks 4.0 Alpha Build is now available (4.0.33731)
Designed, tested and used by 500,000 IT pros in 185 countries. Spiceworks has the everyday IT features:
- Inventory and report on your company’s hardware and software assets automatically.
- Monitor and troubleshoot the hardware and software on your network.
- Run an IT Help Desk for your company that’s easy to use.
Quttera zero-day vulnerability exploits tool v0.3.1.0.0
Quttera detects zero-day vulnerability exploits, shellcodes and potentially malicious executable code hidden in computer files such as movies, images, documents and etc.
Quttera is not just another antivirus solution. Quttera implements patent pending signatureless algorithm capable of detection "zero day" malicious threats without any prior information (threat signature) identifying detected malware. Quttera’s investigation mechanism does not rely on any signatures database but rather on fully heuristic and signatureless detection method which is able to detect existence of "zero-day" software vulnerability exploits into computer information and media files before they compromise the hosted computer.
Process Hacker v1.3.7.1 released
Process Hacker is a feature-packed tool for manipulating processes and services on your computer. It can show you the threads (with symbols), modules, memory regions, handles and token of processes. It has detailed graphs that show CPU usage, memory usage and I/O activity. It can even change the DEP status of some processes and protect/unprotect them!
Cain & Abel v4.9.30 released
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocol.
SQLMap 0.7rc1 available
sqlmap is an open source command-line automatic SQL injection tool developed in Python. Its goal is to detect and take advantage of SQL injection vulnerabilities on web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user’s specific DBMS tables/columns, run his own SQL statement, read specific files on the file system and more.
BlueMaho (Bluetooth Security Testing Suite) updated to v.090417
BlueMaho is GUI-shell (interface) for suite of tools for testing security of bluetooth devices. It is freeware, opensource, written on python, uses wxPyhon. It can be used for testing BT-devices for known vulnerabilities and major thing to do - testing to find unknown vulnerabilities.
tpcat v1.3 released
PCAT will analyze two packet captures (taken on each side of the firewall as an example) and report any packets that were seen on the source capture but didn’t make it to the destination. It will detect network latency, injected packets and dropped packets..etc.