what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 110 RSS Feed

Files from Francisco Amato

Email addressfamato at infobyte.com.ar
First Active2005-03-22
Last Active2024-10-25
Faraday 2.1.0
Posted Sep 22, 2016
Authored by Francisco Amato | Site github.com

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

Changes: Major refactor of the Faraday client. Updated URL shown when starting Faraday. Multiple bug fixes. Added help section.
tags | tool, rootkit
systems | unix
SHA-256 | f511365491e5905946d85a000fc2f46566cada197e879b2becb7e40cde90e9a0
Faraday 2.0.0
Posted Aug 17, 2016
Authored by Francisco Amato | Site github.com

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

Changes: Added Faraday Server. Improved performance in web UI. Added some basic APIs to Faraday Server. Added licenses management section in web UI. Various other updates and changes.
tags | tool, rootkit
systems | unix
SHA-256 | 05d69e401006acaebfc9c7c51cc1d781e8c2439f1ccfc2b05ef2d928ee6f5a63
Faraday 1.0.22
Posted Jul 4, 2016
Authored by Francisco Amato | Site github.com

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

Changes: GTK is the default interface now. Added new plugin Ndiff. Added new plugin Netcat. Added button to edit your host in the GTK interface. Various other updates and changes.
tags | tool, rootkit
systems | unix
SHA-256 | bc0e3e1d109dedc36a4b8bd38acaf20a9bdc6d8ea141f57aeba14e80aba1541c
Faraday 1.0.21
Posted Jun 22, 2016
Authored by Francisco Amato | Site github.com

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

Changes: Added Import Report dialog to Faraday GTK. Added a 'Loading workspace...' dialog to Faraday GTK. Added host sidebar to Faraday GTK. Added host information dialog to Faraday GTK with the full data about a host, its interfaces, services and vulnerabilities. Added support for run faraday from other directories. Fixed log reapparing after being disabled if user created a new tab. Fixed bug regarding exception handling in Faraday GTK. Now Faraday GTK supports Ctrl+Shift+C / Ctrl+Shift+V to Copy/Paste. Faraday will now not crash if you suddenly lose connection to your CouchDB.
tags | tool, rootkit
systems | unix
SHA-256 | c54ba1825e52da6ac47386229db2cfbe0234894a9cd44a6024f6e1c1a7eefa5c
Evilgrade - The Update Exploitation Framework 2.0.7
Posted Jun 5, 2016
Authored by Francisco Amato | Site infobyte.com.ar

Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates. This framework comes into play when the attacker is able to make traffic redirection, and such thing can be done in several ways such as: DNS tampering, DNS Cache Poisoning, ARP spoofing Wi-Fi Access Point impersonation, DHCP hijacking with your favorite tools. This way you can easy take control of a fully patched machine during a penetration test in a clean and easy way. The main idea behind the is to show the amount of trivial errors in the update process of mainstream applications.

Changes: Multiple modules added.
tags | tool, spoof
systems | unix
SHA-256 | 5ff5a696eabb5bfbadbfa14d649ca56aed0b45eefe4a2b3bbc6a6caef18b38e0
Faraday 1.0.20
Posted May 27, 2016
Authored by Francisco Amato

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

Changes: Removed description from Hosts list in WEB UI. Fixed sort in Hosts list in WEB UI. Fixed ports sorting in Host view in WEB UI. Added search link for OS in Hosts list in WEB UI. Removed description from Services list in WEB UI. Added version to Services list in WEB UI. Modified false values in Hosts list in WEB UI. Added search links in Services list in WEB UI. Added scrollbar in Gtk Terminal. Various other updates and improvements.
tags | tool, rootkit
systems | unix
SHA-256 | 3f546d4bc5830e0c3e87f2da9304a10a3b6063f9b82860cf7bfb76bcf02be145
Faraday 1.0.19
Posted May 6, 2016
Authored by Francisco Amato

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

Changes: Added Open services count to Hosts list in WEB UI. Improved zsh integration. Various other updates and improvements.
tags | tool, rootkit
systems | unix
SHA-256 | 8e785b00507681b7c2585044c035db5d62dd4e8fd2d90d57728b3e238f817d7a
Faraday 1.0.18
Posted Apr 7, 2016
Authored by Francisco Amato

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

Changes: Experimental JIRA integration has been added. The Faraday Proxy Server has been added. Various other updates and improvements.
tags | tool, rootkit
systems | unix
SHA-256 | 70c1a713ee5279b1fc1ce9ba530bbcb7c77b7d9efaf2d0feb41a0274a68579fc
Faraday 1.0.17
Posted Feb 28, 2016
Authored by Francisco Amato

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

Changes: Fixed bug in pip debian. Added support for Mint 17. Various other updates and fixes.
tags | tool, rootkit
systems | unix
SHA-256 | 39e66690bada599a4ae01e4a8c83e8d541446b05d8b678ead86e25c098cb864b
Faraday 1.0.16
Posted Dec 21, 2015
Authored by Francisco Amato

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

Changes: Immunity Canvas plugin added. Added Dig plugin. Added Traceroute plugin. Various other updates and fixes.
tags | tool, rootkit
systems | unix
SHA-256 | 53da89d5c48f26c0de9020e49b3846f04e034b5b376537463c65565ab2d9503f
Distro Checker 1.0.1
Posted Oct 6, 2015
Authored by Francisco Amato | Site blog.infobytesec.com

Distro Checker is a tool written for doing cross distribution exploit testing.

Changes: Various updates.
tags | tool
systems | unix
SHA-256 | 022a90231764ed9b0e48572c61d2794b93fa205b0a56e7db376cd45c213afd39
Faraday 1.0.15
Posted Oct 6, 2015
Authored by Francisco Amato

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

Changes: Hosts and Services views now have pagination and search. Continuous Scanning Tool cscan added to ./scripts/cscan. Added sections of Commercial versions. Various other updates and additions.
tags | tool, rootkit
systems | unix
SHA-256 | ec2e393341678fc93eb61c1bbf9cdc6a0b41885d9bbd93b0417173fe657a7509
Faraday 1.0.14
Posted Sep 10, 2015
Authored by Francisco Amato | Site github.com

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

Changes: Removed old couchdb upgrade process. Refactored GUI Web. Various other updates and additions.
tags | tool, rootkit
systems | unix
SHA-256 | 839f26db7940b505813ce047ddd26ae71f41b83ecb0aa74057ebfdc424b8057e
Faraday 1.0.13
Posted Aug 23, 2015
Authored by Francisco Amato

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

Changes: Exported CSV contains filters and columns from Status Report in WEB UI. Added quick vuln edit and delete in WEB UI. Expanded Unit Tests for WEB UI. Various other updates and additions.
tags | tool, rootkit
systems | unix
SHA-256 | 5d449b6f6c55b74d06b56b7435bc79236d2b0002e905211fd0c11d6d20b34d8c
Distro Checker 1.0.0
Posted Aug 4, 2015
Authored by Francisco Amato | Site blog.infobytesec.com

Distro Checker is a tool written for doing cross distribution exploit testing.

tags | tool
systems | unix
SHA-256 | 8bc23f4e57fc2885ba6b8d8ec2eba603aec8e5155f4bf85739fce47220e6419f
Faraday 1.0.11
Posted Jul 1, 2015
Authored by Francisco Amato

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

Changes: Added hosts CRUD. Added services CRUD. Fix ubuntu 15.04 installation bug. Small bug in burp plugin "Import new vulnerabilities" checkbox issue. Added an interactive visualization to calculate the value of a Workspace. Fixed several bugs in WEB UI. Added a URL filter functionality to the status report, allowing searches by fields.
tags | tool, rootkit
systems | unix
SHA-256 | caf8607f90c09b613a5acce793a6ee44c801f19df790ef5d3d0d2b6adb7b2ef9
Faraday 1.0.10
Posted May 7, 2015
Authored by Francisco Amato

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

tags | tool, rootkit
systems | unix
SHA-256 | 75029b8d4d531fbdfff18bd0e3ee54ea38df3769050cbdc44c4ce4d02f4960f1
Evilgrade - The Update Exploitation Framework 2.0
Posted Nov 1, 2010
Authored by Francisco Amato | Site infobyte.com.ar

Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates. This framework comes into play when the attacker is able to make traffic redirection, and such thing can be done in several ways such as: DNS tampering, DNS Cache Poisoning, ARP spoofing Wi-Fi Access Point impersonation, DHCP hijacking with your favorite tools. This way you can easy take control of a fully patched machine during a penetration test in a clean and easy way. The main idea behind the is to show the amount of trivial errors in the update process of mainstream applications.

Changes: 63 new modules have been added.
tags | tool, spoof
systems | unix
SHA-256 | abe0dd1c3735bce07b9684ce4258af4a715be51ad2ad60997051802f63489950
isr-evilgrade-1.0.0.tar.gz
Posted Jul 28, 2008
Authored by Francisco Amato | Site infobyte.com.ar

ISR-evilgrade is a module framework that allows you to take advantage of poor upgrade implementations by injecting fake updates. This tool is especially useful for DNS cache poisoning attacks.

tags | exploit
advisories | CVE-2008-1447
SHA-256 | e76335e42f8a96170e521a354e344acbe972302a445d7803a8159c90337ad9c3
novell-overflow.txt
Posted Jul 10, 2008
Authored by Francisco Amato | Site infobyte.com.ar

The Novell GroupWise Messenger Client (GWIM) version 2.0 suffers from a remote stack overflow.

tags | advisory, remote, overflow
advisories | CVE-2008-2703, CVE-2008-2704
SHA-256 | 0fb39ff951d74e35b5a129db53f49ed20fcdbbf0accc0c08afe719441500a16c
ISR-novell_groupwise.tar.gz
Posted Dec 14, 2007
Authored by Francisco Amato | Site infobyte.com.ar

Metasploit modules for versions 2.7 and 3.0 that exploit a remote stack overflow vulnerability in IMG tag handling for the Novell GroupWise Client version 6.5.6.

tags | exploit, remote, overflow
SHA-256 | c7f87e5264f047a444fdc06b37cfacf18100fb37bdabb5f934e7284defcb4bc2
ISR-groupwise.txt
Posted Dec 14, 2007
Authored by Francisco Amato | Site infobyte.com.ar

The Novell GroupWise Client version 6.5.6 suffers from a remote stack overflow vulnerability.

tags | advisory, remote, overflow
SHA-256 | a819ef2d83abd412bef155a5e4a2da786a3f32837d7e10681fc2080cbf6a83ba
ISR-sqlget-1.0.0.tar.gz
Posted Jun 26, 2007
Authored by Francisco Amato | Site infobyte.com.ar

ISR-sqlget is a blind SQL injection tool developed in Perl. It supports 20 databases, has various evasions features, SSL and proxy support, and more.

tags | tool, scanner, perl, sql injection
systems | unix
SHA-256 | 4ac98124e44160901dbd4f0fd6e7b92ffa530dcbfcbc73d2f2122fe5549a1093
ISR-ibm-eGatherer.tar.gz
Posted Aug 29, 2006
Authored by Francisco Amato | Site infobyte.com.ar

This Metasploit module exploits a code execution vulnerability in the IBM eGatherer ActiveX buffer overflow.

tags | exploit, overflow, code execution, activex
advisories | CVE-2006-4221
SHA-256 | 6280365f18cd390c0a7ec483822ae21f3d8ac6a2a269541e0bb334fa7e54938e
ISR-novellxss.txt
Posted Aug 18, 2006
Authored by Francisco Amato | Site infobyte.com.ar

Novell Groupwise WebAccess is susceptible to cross site scripting attacks. Versions 7 and 6.5 are susceptible.

tags | advisory, xss
advisories | CVE-2006-3817
SHA-256 | ed89535ccb04b5ad07312b883638ed4b701ecaca83e8db67c376289feaf92856
Page 4 of 5
Back12345Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close