Probably the Best Free Security List in the World. Security List Index Select a Security Category: All Items Keys Discontinued or not updated recently (for at least three years). If there are both free and paid versions, this key applies only to the free version. Open Source GPS Tracking System: Traccar Traccar is an open source GPS tracking system for various GPS tracking devices. This Maven Project is written in Java and works on most platforms with installed Java Runtime Environment. System supports more than 80 different communication protocols from popular vendors. It includes web interface to manage tracking devices online… Traccar is the best free and open source GPS tracking system software offers self hosting real time online vehicle fleet management and personal tracking… Traccar supports more than 80 GPS communication protocols and more than 600 models of GPS tracking devices. To start using Traccar Server follow instructions below:
SEES - Social Engineering Email Sender - Attack and Audit Most of the companies nowadays have their firewalls, threat monitoring and prevention security appliances setup. With these mechanisms in place, security precautions are taken and incidents are monitored. Inbound traffic being restricted, SEES on the other hand is developed for sending targeted phishing emails in order to carry sophisticated social engineering attacks/audits. SEES aims to increase the success rate of phishing attacks by sending emails to company users as if they are coming from the very same company’s domain.
Hardware-based security more effective against new threats With software security tools and network vulnerabilities constantly being targeted by hackers, securing hardware components will grow in importance given it is more secure and cybercriminals will find it difficult to alter the physical layer for their purposes. Patrick Moorhead, president and principal analyst of Moor Insight and Strategy, said hardware-based security is more secure than software tools such as antivirus since it cannot be altered. Hardware-based security refers to safeguarding the computer using components such as processors. An RSA spokesperson added the physical layer eliminates the possibility of malware, such as virtual rootkits, from infiltrating the operating system and penetrating the virtualization layer. In 2010, RSA, together with VMWare and Intel, introduced a proof-of-concept framework to integrate security into the entire hardware stack.
Black-Box CAN Network Analysis Framework: CANToolz Yet Another Car Hacking Tool CANToolz is a framework forCANbus network and device analysis. This tool consist of various different modules which can be piped together and used by security researchers and automotive/OEM security testers for black-box analysis of any CANbus system. You can use this software for ECU discovery, MITM testing, fuzzing, bruteforcing, scanning and etc This platform is a try to unify all tricks/tools and other things that you can do with CAN bus in one place. OS RTL - Beta Since this morning, I have added a few more tools, currently here is a list of tools that have been installed. Cryptography = steghide Forensics = exiftool / photorec / scalpel Network Exploitation = Armitage / Metasploit / Veil Packet Analysis = driftnet / dsniff / etherape / sslsniff / sslstrip / tcpdump / wireshark Password Attacks = AgainstSSH / aircrack / chntpw / fcrackzip / hashcat / jtr & johnny / pdfcrack / xhydra
Install Themes In GNOME 3 (GTK3 / Mutter / Metacity Themes) In the latest GNOME 3, changing the theme isn't as easy as you're used to. Using Gnome Tweak Tool you can change the GTK theme but how about the titlebar (Mutter/Metacity theme)? Read on! How to install GNOME3 GTK themes Black Hat USA 2014 - Arsenal Returning bigger than ever for 2014, Black Hat is pleased to once again present Arsenal--a Tool/Demo area where independent researchers and the open source community will showcase some awesome weapons. See below for the full list and descriptions of each of these tools. Hours and Location: August 6, 2014 | 10:00 - 18:00 | Breakers JK August 7, 2014 | 10:00 - 18:00 | Breakers JK Android Device Testing Framework The Android Device Testing Framework ("dtf") is a data collection and analysis framework to help individuals answer the question: "Where are the vulnerabilities on this mobile device?" Dtf provides a modular approach and built-in APIs that allows testers to quickly create scripts to interact with their Android devices.
MITMf - Man-In-The-Middle Attack Framework MITMf is a Framework for Man-In-The-Middle attacks MITMf aims to provide a one-stop-shop for Man-In-The-Middle and network attacks while updating and improving existing attacks and techniques. Originally built to address the significant shortcomings of other tools (e.g Ettercap, Mallory), it’s been almost completely re-written from scratch to provide a modular and easily extendible framework that anyone can use to implement their own MITM attack. Dark-Arch-Linux Downloaded arch dual iso from: iso detectz whether 32/64For usb win32 diskimager: usb notes: win32 worked for me for usb/arch install from cli:# loadkeys us list partitions on all drives:# fdisk -l On a 300gb average drive gonna create two partitions,make the arch (sda1) around 70gb, make that home,then for my wordlists/books and other data storage use the second partition (sda2) and the rest of the drive as swapadjust to your personal preferences Set up partitions:# cfdisk /dev/sdaif you have partitions on there,go ahead and delete them, then write,enter, yesi like to make sure num lock is on...new primary, enter, hit backspace key --> 70000beginning -->bootablearrow downnew -->primary, enter, hit backspace --> 238000beginning, arrow downnew --> primary, enter, use rest of the drive,type, enter, swap (usually 82 shows up auto)write, enter, type yes, enter, quit, enter we won't mount sda2do that later on from xfce4/openbox