Scan & analysing tools

Facebook Twitter
yara-project - A malware identification and classification tool
RIPS - free PHP security scanner using static code analysis RIPS is a tool written in PHP to find vulnerabilities in PHP applications using static code analysis. By tokenizing and parsing all source code files RIPS is able to transform PHP source code into a program model and to detect sensitive sinks (potentially vulnerable functions) that can be tainted by userinput (influenced by a malicious user) during the program flow. Besides the structured output of found vulnerabilities RIPS also offers an integrated code audit framework for further manual analysis. NOTE: RIPS 0.5 development is abandoned. A complete rewrite is in development and used as an academic prototype but it is not publicly available yet. More information about the new version can be found in this paper. RIPS - free PHP security scanner using static code analysis
code search ⋅ search
Protect Your Interwebs
BFT a Browser forensic tool
Labs Research: Solving a Little Mystery Labs Research: Solving a Little Mystery Firmware analysis is a fascinating area within the vast world of reverse engineering, although not very extended. Sometimes you end up in an impasse until noticing a minor (or major) detail you initially overlooked. That's why sharing methods and findings is a great way to advance into this field.
Code Exploration Blog Today, I'm releasing joern, a new tool for robust analysis of source code. When pointed to a directory, it parses anything that "kind of looks like" C/C++ code and constructs Abstract Syntax Trees (ASTs), Control Flow Graphs (CFGs) as well as a searchable index. Joern allows you to implement quick-and-dirty language aware static analysis tools without requiring a complicated API to be learned or a plugin for an existing IDE to be written. Code Exploration Blog
jsunpack-n - A generic JavaScript unpacker jsunpack-n - A generic JavaScript unpacker jsunpack-n emulates browser functionality when visiting a URL. It's purpose is to detect exploits that target browser and browser plug-in vulnerabilities. It accepts many different types of input: PDF files - samples/sample-pdf.file Packet Captures - samples/sample-http-exploit.pcap HTML files JavaScript files SWF files
theHarvester is a tool to gather emails, subdomains, hosts, employee names, open ports and banners from different public sources like search engines, PGP key servers and SHODAN computer database. This tools is intended to help Penetration testers in the early stages of the project It’s a really simple tool, but very effective. The sources supported are: Google – emails,subdomains/hostnames Google profiles – Employee names Bing search – emails, subdomains/hostnames,virtual hosts Pgp servers – emails, subdomains/hostnames Linkedin – Employee names Exalead – emails,subdomain/hostnames New Features Time delays between requests XML and HTML results export Search a domain in all sources Virtual host verifier Shodan computer database integration Active enumeration (DNS enumeration,DNS reverse lookups, DNS TLD expansion) Basic graph with stats theHarvester – Gather E-mail Accounts, Subdomains, Hosts, Employee Names – Information Gathering Tool theHarvester – Gather E-mail Accounts, Subdomains, Hosts, Employee Names – Information Gathering Tool
Как расшифровать PHP-скрипт | — блог о web-безопасности Тема декодирования зашифрованных PHP-скриптов уже однажды мной затрагивалась в посте PHP и зашифрованный код . В нем я описал способ получения значений всех инициализированных переменных и списка объявленных функций в скрипте, зашифрованным протектором ionCube. Тогда, в 2009 году, расшифровать скрипт под ionCube было проблематично – на тот момент существовали лишь платные сервисы. Как расшифровать PHP-скрипт | — блог о web-безопасности Welcome to Ohloh Code, the world’s largest, most comprehensive free code search engine! Koders has now merged with Ohloh to become your one-stop resource for both code and analysis. Check out our FAQ for more info. Other operators: ctor: Constructor definitions edef: Enum definitions ctordec: Constructor declarations fdef: Field definitions
Open Search - Home
How do I perform a stack trace search ? Clicking the checkbox labeled "Stack Trace Search" on the GrepCode home page provides a text area where you can paste your Java stack trace. Doing a search after that will take you to a page with the results of your stack trace search. Alternatively, if you are not on the main page, you can click on the link in the header labeled "Stack Trace Search", and perform the same search. FAQ - - Java Source Code Search 2.0 FAQ - - Java Source Code Search 2.0
DEFT Linux 7 RC1
List of tools for static code analysis

List of tools for static code analysis

This is a list of tools for static code analysis. By language[edit] Multi-language[edit]
Cppcheck - A tool for static C/C++ code analysis Cppcheck is a static analysis tool for C/C++ code. Unlike C/C++ compilers and many other analysis tools it does not detect syntax errors in the code. Cppcheck primarily detects the types of bugs that the compilers normally do not detect. The goal is to detect only real errors in the code (i.e. have zero false positives). Download Cppcheck - A tool for static C/C++ code analysis
FindBugs v.2.0 - Find Bugs in Java Programs
Normally, without access to the original source code, testing the security of a Java client is unpredictable at best and unrealistic at worst. With access the original source, you can run a simple Java program and attach a debugger to it remotely, stepping through code and changing variables where needed. Doing the same with an applet is a little bit more difficult. Unfortunately, real-life scenarios don't offer you this option, anyway. Compilation and decompilation of Java are not really as deterministic as you might imagine. Therefore, you can't just decompile a Java application, run it locally and attach a debugger to it. javasnoop - A tool that lets you intercept methods, alter data and otherwise hack Java applications running on your computer. - Free Multi-Engine Online Virus Scanner v1.02, Supports 36 AntiVirus Engines!

关于VirSCAN 是一个非盈利性的免费为广大网友服务的网站,它通过多种不同厂家提供的最新版本的病毒检测引擎对您上传的可疑文件进行在线扫描,并可以立刻将检测结果显示出来,从而提供给您可疑程度的建议。 不能替代安装在您个人电脑中的杀毒软件,我们并不能实时的保护您的系统安全。
Arachni Web scanner (CLI & WEB GUI) ~ Sudhir @ Pentester Download the CDE package from: Linux users enjoy the privilege of a CDE package which is a compressed archive and contains a full preconfigured Linux environment in the form of a sandbox. Quick Basic Usage of Arachni: To see help type :
p0f v3 Copyright (C) 2012 by Michal Zalewski <> Yeah, it's back! 1. What's this?
loadbalancer-finder - Load Balancer Finder
wavsep - Web Application Vulnerability Scanner Evaluation Project
Особенности поведения нового TCP/IP стека Windows / Блог компании Positive Technologies
metagoofil - Metadata Information Gathering