The Metabrik Platform bind together a classic Shell with a Perl interpreter as a REPL (Read-Eval-Print-Loop) and a ton of small Briks. Briks are reusable components each performing a specific task. You chain Briks together using Perl variables, they are used to pass output of a Brik Command as input for another Brik Command.
c06706bb9fd49bab1f317f9a259e8b26787abb0f6a8fe9a438c094e2035df244
SinFP3 is a complete framework for network discovery. Its main purpose is to perform active fingerprinting, but it can also do passive fingerprinting. Both modes are available over IPv4 and IPv6. This new version introduces a plugin-based architecture, allowing anyone to develop their own tools around the framework.
cc39d157143cb1731e88b425752b9ed94bda6f8c149d27e9242a7ae0ad536412
These are the slides presented at EuSecWest and Ekoparty in 2012 for SinFP3 - More than a complete framework for operating system fingerprinting.
438deec4e015d4978b01c31e37ec43970322c4a0e93d327e0bdfcf03d803c9ea
SSL Capable NetCat is just what it sounds like. It's a perl script that works just like netcat but has SSL capabilities.
a20c5c6ad561e60cb6dfad12dfb36badee97f23d2e0d50911d29e98e4b8220d6
SSL Capable NetCat is just what it sounds like. It's a perl script that works just like netcat but has SSL capabilities.
5224fa34284e7ddc6eb9ac31cb6f33a7b1a4e4a78f79a0f913e0a995e84c77f7
OSPF Attack Shell module. This may be useful for writing fuzzers.
9e8e9cbd17a599eed92073f1f097f53fafcc4cf6a2118d7b8cdc29d4ed9f50b4
LLTD (Link Layer Topology Discovery Protocol) Perl module written using the Net::Frame framework. This may be useful for creating fuzzers.
558b4db46f80f7aa432c73fd7951ffc95d6ea0618bc7edf21cf73cf7fb03eea8
SinFP is a new approach to OS fingerprinting, which bypasses limitations that nmap has. It only requires one open TCP port, sends only fully standard TCP packets, and limits the number of tests to 2 or 3.
b331059034af9107a5337cf0610c72d0451724675b3bc870cfbdbf7ae99ffe20
SinFP is a new approach to OS fingerprinting, which bypasses limitations that nmap has. It only requires one open TCP port, sends only fully standard TCP packets, and limits the number of tests to 2 or 3.
1369b428d4cce63274879980954dcc11f87c7f42167155c8cb8327a0832eb682
SinFP is a new approach to OS fingerprinting, which bypasses limitations that nmap has. It only requires one open TCP port, sends only fully standard TCP packets, and limits the number of tests to 2 or 3.
6bd9ec20b3c5e3d9ea4dfc1b5b6ade003edd634553b507ed88da2c3ef326e743
SinFP is a new approach to OS fingerprinting, which bypasses limitations that nmap has. It only requires one open TCP port, sends only fully standard TCP packets, and limits the number of tests to 2 or 3.
0429d5c91cb785153e730ce42c50bb240fffc5888c0171585875414932b9a543
BEA WebLogic versions 8.1 SP4 and below suffer from a cross site scripting flaw in the Administration console.
cc1ead976d71ba856423d2033f5c4d1c22ae5b972914ad6a077d117cc08fd030
using net::packet allows an attacker to take advantage of the MS05-019 vulnerability allowing remote command execution and denial of service.
aa7cc3acb178d16703da6d5d8b2a2722d5c69cc910a12a1c0e6c1151329c4e4a