Tools
Tools
John the Ripper is a password cracking tool, that can be used in multiple operating
systems such as Unix, Windows, etc. It is helpful in detecting weak passwords in
Unix environment. Besides several crypt(3) password hash types most commonly found
on various Unix systems, supported out of the box are Windows LM hashes, plus lots
of other hashes and ciphers in the community-enhanced version.
Nikto is an Open Source (GPL) web server scanner that performs comprehensive tests
against web servers for multiple items, including over 6700 potentially dangerous
files/programs, checks for outdated versions of over 1250 servers, and version
specific problems on over 270 servers. It also checks for server configuration
items such as the presence of multiple index files, HTTP server options, and will
attempt to identify installed web servers and software.
Havij is an automated SQL Injection tool that helps penetration testers to find and
exploit SQL Injection vulnerabilities on a web page.
Infoga: used for gathering email account information (IP, hostname, country, etc.)
Maltego: to determine the relationships and real-world links between people, groups
of people, organizations, websites, Internet infrastructure, documents.
Hashcat: Hashcat is a cracker compatible with multiple OSs and platforms and can
perform multi-hash (MD4, 5; SHA – 224, 256, 384, 512; RIPEMD-160; etc.), multi-
device password cracking.
Secure Shell Bruteforcer: It is a password cracking tool that allows you to reset
unknown or lost Windows local administrator, domain administrator, and other user
account passwords.
OmniHide Pro: to hide any secret file within an innocuous image, video, music file,
etc.
DeepSound: to hide/extract any secret data in/from audio files (WAV and FLAC). In
addition, it can encrypt secret files, thereby enhancing security.
Fiddler: for performing web-application security tests such as the decryption of
HTTPS traffic and manipulation of requests using a MITM decryption technique.
AlienVault USM: AlienVault Unified Security Management (USM) offers powerful threat
detection, incident response, and compliance management across cloud, on-premises,
and hybrid environments.
THC-Hydra: is a network logon cracker that supports many different services, such
as IPv6 and Internationalized RFC 4013.
linpostexp: The linpostexp tool obtains detailed information on the kernel, which
can be used to escalate privileges on the target system.
Dylib Hijack Scanner: Dylib Hijack Scanner (DHS) is a simple utility that will scan
your computer for applications that are either susceptible to dylib hijacking or
have been hijacked.
DPAT: DPAT is a Python script that generates password use statistics from password
hashes dumped from a domain controller (DC) and a password crack file such as
hashcat.pot generated using the hashcat tool during password cracking.
Spytech SpyAgent: Spytech SpyAgent is computer spy software that allows you to
monitor everything users do on your computer—in total secrecy.
OmniHide Pro: OmniHide PRO allows you to hide any secret file within an innocuous
image, video, music file, etc.
Mimikatz: Mimikatz allows attackers to pass Kerberos TGT to other computers and
sign in using the victim’s ticket. The tool also helps in extracting plaintext
passwords, hashes, PIN codes, and Kerberos tickets from memory.
zsteg: The zsteg tool is used to detect stegano-hidden data in PNG and BMP image
files.
crontab in Linux:
crontab <Filename> :Installs or modifies the crontab file
crontab -l :Displays currently running crontabs
crontab -r :Deletes the crontab file
crontab -r <Username> :Deletes the crontab of the specified user
crontab -e : Schedules software updates/modifies the crontab file of the
current user
crontab -u <Username> -e :Modifies the crontab of the specified user
nmap -T4 –A <target IP/network>: Attackers use this Nmap scan commands to identify
the RPC service running on the network.
showmount -e <Target IP Address>: Attackers uses this command to check if any share
is available for mounting on the target host.
ldns-walk @<IP of DNS Server> <Target domain>: Attackers use this query to
enumerate a target domain using the DNS server to obtain DNS record files.
Stream Armor: Stream Armor is a tool used to discover hidden ADSs and clean them
completely from your system. Its advanced auto analysis, coupled with an online
threat verification mechanism, helps you eradicate any ADSs that may be present
GFI LanGuard: GFI LanGuard scans for, detects, assesses, and rectifies security
vulnerabilities in a network and its connected devices. This is done with minimal
administrative effort. It scans the operating systems, virtual environments, and
installed applications through vulnerability check databases
Snow: Snow is a program for concealing messages in text files by appending tabs and
spaces to the ends of lines, and for extracting messages from files containing
hidden messages. The user hides the data in the text file by appending sequences of
up to seven spaces, interspersed with tabs. This usually allows three bits to be
stored every eight columns. There is an alternative encoding scheme that uses
alternating spaces and tabs to represent 0s and 1s.
PoisonIvy: PoisonIvy gives the attacker practically complete control over the
infected computer. The PoisonIvy remote administration tool is created and
controlled by a PoisonIvy management program or kit. The PoisonIvy kit consists of
a graphical user interface, and the backdoors are small (typically, <10 kB).
Necurs: is a distributor of many pieces of malware, most notably Dridex and Locky.
It delivers some of the worst banking Trojans and ransomware threats in batches of
millions of emails at a time, and it keeps reinventing itself. Necurs is
distributed by spam e-mails and downloadable content from questionable/illegal
sites. It is indirectly responsible for a significant portion of cyber-crime.
Purple Fox Rootkit: The Purple Fox rootkit enables attackers to conceal malware on
targeted devices, making it difficult for security solutions to detect and remove
the malware. It is a sophisticated malware attack that targets Windows machines and
spreads its infection from one machine to another. The Purple Fox rootkit can be
distributed via a fake malicious Telegram installer.
Invisible ink: Invisible ink, or “security ink,” is one of the methods of technical
steganography. It is used for invisible writing with colorless liquids and can
later be made visible by certain pre-negotiated manipulations such as lighting or
heating. For example, if you use onion juice and milk to write a message, the
writing will be invisible, but when heat is applied, it turns brown and the message
becomes visible.
Spread spectrum: This technique is less susceptible to interception and jamming. In
this technique, communication signals occupy more bandwidth than required to send
the information. The sender increases the band spread by means of code (independent
of data), and the receiver uses a synchronized reception with the code to recover
the information from the spread spectrum data.
MoonBounce: concealed within UEFI firmware in the SPI flash that is scheduled to be
executed at a specific time.
GlitchPOS: is a fake cat game that is embedded in malware and not displayed at the
time of execution. It is a Trojan that masquerades as a cat game.
File-System Commands:
find / -perm -3000 -ls 2> /dev/null
Discovers SUID-executable binaries
find / -path /sys -prune -o -path /proc -prune -o -type f -perm -o=w -ls
2> /dev/null
Discovers world-writable files
find / -path /sys -prune -o -path /proc -prune -o -type d -perm -o=w -ls
2> /dev/null
Discovers world-writable directories
sudo -l
Displays the list of permitted and forbidden commands
Sysinternals Commands:
psexec -i \\<RemoteSystem> cmd
Establishes an interactive CMD with a remote system
psexec -i -d -s c:\windows\regedit.exe
Retrieves the contents of security keys and SAM
Service Commands:
sc queryex type=service state=all
Lists all the available services
Information-Gathering Commands:
ps -ef : Displays the current process along with its process ID (PID)
Mount : Attaches a file system to the directory tree structure
route -n : Displays host/network names in numeric form
/sbin/ifconfig -a : Displays network configuration details
cat /etc/crontab : Displays running cron jobs
ls -la /etc/cron.d : Displays the software package used for the specified
cron job
cat /etc/exports : Displays directories that can be exported to NFS clients
cat /etc/redhat* /etc/debian* /etc/*release : Displays the OS version details
ls /etc/rc* : Lists bootup services
egrep -e '/bin/(ba)?sh' /etc/passwd :Displays all the users who have shell
access
cat ~/.ssh/ : Displays SSH relationships and login details
cat /dev/null > ~.bash_history && history –c && exit : This command deletes the
complete command history of the current and all other shells and exits the shell.
history -w: This command only deletes the history of the current shell, whereas the
command history of other shells remains unaffected
export HISTSIZE=0: This command disables the Bash shell from saving history.
HISTSIZE determines the number of commands to be saved, which is set to 0.
CMD/Shell:
touch MaliciousFile.txt
Use the touch command to create a file within the hidden folder
mkdir .HiddenMaliciousFiles
Use the following command to create a new hidden folder in a Linux system
attrib +h +s +r <FolderName>
Attackers use this command with administrator privileges to hide any file or
folder in a Windows system
SECEVENT.EVT: can manipulate the log files with the help of: SECEVENT.EVT
(security): failed logins, accessing files without privileges
SYSEVENT.EVT (system): Driver failure, things not operating correctly
APPEVENT.EVT (applications)
Regedit:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AppKey
stores the hotkeys.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts
is responsible for file extension association.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\
RecentDocs key maintains a list of recently opened or saved files via Windows
Explorer-style dialog boxes.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\
MountPoints2 stores the network locations.
PowerView:
Get-DomainSID
Retrieves the security ID (SID) of the current domain.
Get-NetDomain
Retrieves information related to the current domain including domain
controllers (DCs).
(Get-DomainPolicy)."SystemAccess"
Retrieves information related to the policy configurations of the domain’s
system access.
***********
Wireshark: Wireshark lets you capture and interactively browse the traffic running
on a computer network.
BuzzSumo: BuzzSumo’s advanced social search engine finds the most shared content
for a topic, author, or domain. It shows the shared activity across all the major
social networks including Twitter, Facebook, LinkedIn, Google Plus, and Pinterest.
GFI LanGuard: GFI LanGuard scans for, detects, assesses, and rectifies security
vulnerabilities in a network and its connected devices.
Spokeo: Attackers can use the Spokeo people search online service to search for
people belonging to the target organization. Using this service, attackers obtain
information such as phone numbers, email addresses, address history, age, date of
birth, family members, social profiles, and court records.
Netcraft: Attackers use various online tools such as Netcraft, Shodan, and Censys
to detect the operating system used at the target organization.
Photon: Attackers can use tools such as Photon to retrieve archived URLs of the
target website from archive.org.
Nikto: Nikto is an Open Source (GPL) web server scanner that performs comprehensive
tests against web servers for multiple items, including over 6700 potentially
dangerous files or programs, checks for outdated versions of over 1250 servers, and
checks for version specific problems on over 270 servers.
Reverse Lookup: The Reverse Lookup tool performs a reverse IP lookup by taking an
IP address and locating a DNS PTR record for that IP address
ShellPhish: ShellPhish is a phishing tool used to phish user credentials from
various social networking platforms such as Instagram, Facebook, Twitter, and
LinkedIn.
NodeXL: Attackers use various tools such as Gephi, SocNetV, and NodeXL to construct
and analyze social networks and obtain critical information about the target
organization/users.
Burp Suite: Burp Suite is an integrated platform for performing security testing of
web applications. Its various tools work together to support the entire testing
process, from initial mapping and analysis of an application's attack surface to
finding and exploiting security vulnerabilities.
indeed.com, dice.com, and linkup.com are websites that provide online job services.
Financial services such as Google Finance, MSN Money, Yahoo Finance, and
Investing.com can provide a large amount of useful information such as the market
value of a company’s shares, company profile, competitor details, stock exchange
rates, corporate press releases, financial reports along with news, and blog search
articles about corporations.
Metagoofil: Metagoofil extracts metadata of public documents (pdf, doc, xls, ppt,
docx, pptx, and xlsx) belonging to a target company.
Sherlock: To search a vast number of social networking sites for a target username.
This tool helps the attacker to locate the target user on various social networking
sites along with the complete URL.
OpUtils: SNMP enumeration protocol that helps to monitor, diagnose and trouble
shoot the IT resources.
Spyse: Spyse is an online platform that can be used to collect and analyze
information about devices and websites available on the Internet.
THC-Hydra: THC Hydra is a parallelized login cracker that can attack numerous
protocols. This tool is a proof-of-concept code that provides researchers and
security consultants the possibility to demonstrate how easy it would be to gain
unauthorized remote access to a system.
FOCA Features:
Web Search - Searches for hosts and domain names through URLs associated with
the main domain. Each link is analyzed to extract information from its new host and
domain names.
DNS Search - Checks each domain to ascertain the host names configured in NS,
MX, and SPF servers to discover the new host and domain names.
IP Resolution - Resolves each host name by comparison with the DNS to obtain
the IP address associated with this server name. To perform this task accurately,
the tool performs analysis against the organization’s internal DNS.
RPCScan: RPCScan communicates with RPC services and checks misconfigurations on NFS
shares.
NetScanTools Pro: NetScanTools Pro’s SMTP Email Generator tool tests the process of
sending an email message through an SMTP server.
Infoga: Infoga is a tool used for gathering email account information from
different public sources and it checks if an email was leaked using the
haveibeenpwned.com API.
Metagoofil: Metagoofil extracts metadata of public documents (pdf, doc, xls, ppt,
docx, pptx, and xlsx) belonging to a target company.
Secure Shell Bruteforcer: It is a password cracking tool that allows you to reset
unknown or lost Windows local administrator, domain administrator, and other user
account passwords. In the case of forgotten passwords, it even allows users instant
access to their locked computer without reinstalling Windows.
Audio Spyware: Audio spyware is a sound surveillance program designed to record
sound onto a computer. The attacker can silently install the spyware on the
computer, without the permission of the computer user and without sending them any
notification.
OmniHide Pro: OmniHide PRO allows you to hide any secret file within an innocuous
image, video, music file, etc.
DeepSound: DeepSound allows you to hide any secret data in audio files (WAV and
FLAC). It also allows you to extract secret files directly from audio CD tracks. In
addition, it can encrypt secret files, thereby enhancing security.
DPAT: DPAT is a Python script that generates password use statistics from password
hashes dumped from a domain controller (DC) and a password crack file such as
hashcat.pot generated using the hashcat tool during password cracking.
Spytech SpyAgent: Spytech SpyAgent is computer spy software that allows you to
monitor everything users do on your computer—in total secrecy.
Hashcat: Hashcat is a cracker compatible with multiple OSs and platforms and can
perform multihash (MD4, 5; SHA – 224, 256, 384, 512; RIPEMD-160; etc.), multi-
device password cracking.
Dylib Hijack Scanner: Dylib Hijack Scanner (DHS) is a simple utility that will scan
your computer for applications that are either susceptible to dylib hijacking or
have been hijacked.
Sherlock: Attackers use Sherlock to search a vast number of social networking sites
for a target username. This tool helps the attacker to locate the target user on
various social networking sites along with the complete URL.
Qualys VM: helps to continuously identify threats and monitor unexpected changes in
a network before they turn into breaches
Sherlock: Attackers use Sherlock to search a vast number of social networking sites
for a target username. This tool helps the attacker to locate the target user on
various social networking sites along with the complete URL.
GrayFish Rootkit: GrayFish is a Windows kernel rootkit that runs inside the Windows
operating system and provides an effective mechanism, hidden storage and malicious
command execution while remaining invisible. It injects its malicious code into the
boot record which handles the launching of Windows at each step. It implements its
own Virtual File System (VFS) to store the stolen data and its own auxiliary
information.
Hardware/Firmware Rootkit: Hardware/firmware rootkits use devices or platform
firmware to create a persistent malware image in hardware, such as a hard drive,
system BIOS, or network card. The rootkit hides in firmware as the users do not
inspect it for code integrity. A firmware rootkit implies the use of creating a
permanent delusion of rootkit malware.
Boot Loader Level Rootkit: Boot loader level (bootkit) rootkits function either by
replacing or modifying the legitimate bootloader with another one.The boot loader
level (bootkit) can activate even before the operating system starts. So, the boot-
loader-level (bootkit) rootkits are serious threats to security because they can
help in hacking encryption keys and passwords.
Senna Spy Trojan Generator: This is a Trojan that comes hidden in malicious
programs. Once you install the source (carrier) program is installed, this Trojan
attempts to gain "root" access (administrator level access) to your computer
without your knowledge.
DarkHorse Trojan Virus Maker: DarkHorse Trojan Virus Maker is used to creates user-
specified Trojans by selecting from various options available. The Trojans created
to act as per the options selected while creating them. For e.g., if you choose the
option Disable Process, the Trojan disables all processes on the target system. The
screenshot in the slide shows a snapshot of Dark Horse Trojan Virus Maker that
displays its various available options.
An attacker can use BitCrypter to encrypt and compress 32-bit executables and .NET
apps, without affecting their direct functionality. A Trojan or malicious software
piece can be encrypted onto a legitimate software to bypass firewalls and antivirus
software. BitCrypter supports a wide range of OSs from Windows XP to the latest
Windows 10.
BotenaGo: The BotenaGo exploit kit written in the Go scripting language contains
over 30 variants of exploits and is cable of attacking millions of IoT and routing
devices worldwide. BotenaGo was first discovered in November 2021 and observed as
Mirai botnet malware by antivirus software. BotenaGo is successfully being used by
attackers in distributing DDoS functionalities by spreading payloads to victim
devices.
Process Monitor: Process Monitor is a monitoring tool for Windows that shows real-
time file system, registry, and process/thread activity.
Splunk: It is a SIEM tool that can automatically collect all the event logs from
all the systems present in the network.
IExpress Wizard: It is a wrapper tool that guides the user to create a self-
extracting package that can automatically install the embedded setup files,
Trojans, etc.
Godzilla: It is a downloader that can be used for deploying malware on the target
machine
Spytech SpyAgent: Spytech SpyAgent is computer spy software that allows you to
monitor everything users do on your computer—in total secrecy.
Spytech SpyAgent: Spytech SpyAgent is computer spy software that allows you to
monitor everything users do on your computer—in total secrecy.
IExpress Wizard: IExpress Wizard is a wrapper program that guides the user to
create a self-extracting package that can automatically install the embedded setup
files, Trojans, etc.
Create services:
srvman.exe add <file.exe/file.sys> [service name] [display name]
[/type:<service type>] [/start:<start mode>] [/interactive:no] [/overwrite:yes]
Delete services:
srvman.exe delete <service name>
Start/stop/restart services:
srvman.exe start <service name> [/nowait] [/delay:<delay in msec>] /
srvman.exe stop <service name> [/nowait] [/delay:<delay in msec>] / srvman.exe
restart <service name> [/delay:<delay in msec>]
Sheep Dip: Sheep dipping refers to the analysis of suspect files, incoming
messages, etc. for malware. The users isolate the sheep-dipped computer from other
computers on the network to block any malware from entering the system. Before
performing this process, it is important to save all downloaded programs on
external media such as CD-ROMs or DVDs. A computer used for sheep dipping should
have tools such as port monitors, files monitors, network monitors, and one or more
anti-virus programs for performing malware analysis of files, applications,
incoming messages, external hardware devices (such as USB, Pen drive, etc.), and so
on.
Sandbox: App sandboxing is a security mechanism that helps protect systems and
users by limiting resources the app can access to its intended functionality on the
mobile platform. Often, sandboxing is useful in executing untested code or
untrusted programs from unverified third parties, suppliers, untrusted users, and
untrusted websites. This is to enhance security by isolating an application to
prevent intruders, system resources, malwares such as Trojans and viruses, and
other applications from interacting with the protected app.
BinText is a small text extractor utility that can extract text from any kind of
file and includes the ability to find plain ASCII text, Unicode (double byte ANSI)
text and Resource strings, providing useful information for each item in the
optional "advanced" view mode.
UPX (Ultimate Packer for Executables) is a free and open source executable packer
supporting a number of file formats from different operating systems.
ASPack is an advanced EXE packer created to compress Win32 executable files and to
protect them against non-professional reverse engineering.
PE Explorer lets you open, view and edit a variety of different 32-bit Windows
executable file types (also called PE files) ranging from the common, such as EXE,
DLL and ActiveX Controls, to the less familiar types, such as SCR (Screensavers),
CPL (Control Panel Applets), SYS, MSSTYLES, BPL, DPL and more (including executable
files that run on MS Windows Mobile platform).
Process Monitor: Process Monitor is a monitoring tool for Windows that shows real-
time file system, Registry, and process/thread activity.
More data captured for operation input and output parameters.
Non-destructive filters allow you to set filters without losing data.
Capture of thread stacks for each operation makes it possible in many cases
to identify the cause of an operation.
Reliable capture of process details, including image path, command line, user
and session ID.
Configurable and moveable columns for any event property.
Filters can be set for any data field, including fields not configured as
columns.
Advanced logging architecture scales to tens of millions of captured events
and gigabytes of log data.
Process tree tool shows the relationship of all processes referenced in a
trace.
Native log format preserves all data for loading in a different Process
Monitor instance.
TCPView: TCPView is a Windows program that shows detailed listings of all TCP and
UDP endpoints on the system, including the local and remote addresses, and the
state of TCP connections. It provides a subset of the Netstat program that ship
with Windows.
IDA Pro: IDA Pro is a multi-platform disassembler and debugger that explores binary
programs, for which source code is not always available, to create maps of their
execution. It shows the instructions in the same way as a processor executes them
in a symbolic representation called assembly language. Thus, it is easy for you to
find the harmful or malicious processes.
Registry monitoring is used examine the changes made to the system’s registry by
malware.
readelf: displays information about one or more ELF object files. to extract static
artifacts from an ELF executable.
readelf -s <malware-sample> : to extract symbols from an ELF executable
Verisys: It is a file integrity checking tool that can help analysts Scan for
suspicious files and folders and detect any Trojans installed as well as system
file modifications.
ophcrack: ophcrack is a Windows password-cracking tool that uses rainbow tables for
cracking passwords. It comes with a graphical user interface (GUI) and runs on
different OSs such as Windows, Linux/UNIX, etc.
strace command:
strace -p <ProcessID> : Run this command for attaching the strace tool to the
active process.
strace -c ls > /dev/null : Run the following command to count time, calls,
and errors for each system call.
cSploit: cSploit is an Android network analysis and penetration suite that is used
to map the local network, fingerprint hosts' operating systems and open ports,
perform integrated traceroute, forge TCP/UDP packets, and perform MITM attacks such
as password sniffing, JavaScript injection, capturing real-time network traffic,
DNS spoofing, and session hijacking.
Intezer: Intezer is malware analysis platform that scans files, URLs, end points,
and memory dumps. It extracts strings from uploaded malware samples and identifies
whether those strings are used in other files. It reduces the effort of malware
analysts by analyzing unknown malware that is difficult to trace.
Network Spoofer: Network Spoofer allows you to change websites on others’ computers
via an Android phone.
Mach-O: Mach object (Mach-O) is an executable file format similar to the Portable
Executable (PE) format for Windows and ELF for Linux. It is associated with
binaries present in macOS and iOS.
TCPView: TCPView is a Windows program that shows detailed listings of all TCP and
UDP endpoints on the system, including the local and remote addresses, and the
state of the TCP connections.
Monit: It is a process monitoring tool that helps security analysts in
understanding the processes that the malware initiates and takes over after
execution.
pagestuff: The pagestuff utility can be used to view Mach-O executable files and
find information regarding the logical pages associated with those files. It helps
identify malicious code and Objective-C methods such as deleteAppBySelf.
Mimikatz: Mimikatz allows attackers to pass Kerberos TGT to other computers and
sign in using the victim’s ticket. The tool also helps in extracting plaintext
passwords, hashes, PIN codes, and Kerberos tickets from memory.
strace: The strace tool can be used to view or trace the system calls in a Linux
environment. The strace tool intercepts and records system calls by a process and
the signals received by the process.
BitCrypter: used to encrypt and compress 32-bit executables and .NET apps without
affecting their direct functionality. A Trojan or malicious software piece can be
encrypted into legitimate software to bypass firewalls and antivirus software.
BitCrypter supports a wide range of OS, from Windows XP to the latest Windows 10.
Resource Hacker: Resource Hacker™ is a resource editor for 32bit and 64bit Windows®
applications. It's both a resource compiler (for *.rc files), and a decompiler -
enabling viewing and editing of resources in executables (*.exe; *.dll; *.scr;
etc.) and compiled resource libraries (*.res, *.mui).
Hakiri: Hakiri monitors Ruby apps for dependency and code security vulnerabilities.
Snyk: Snyk is the platform developers choose to build cloud native applications
securely.
DriverView: utility displays a list of all the device drivers currently loaded on
the system along with information such as load address of the driver, description,
version, and product name.
HashMyFiles: provides information about the file, such as the full path of the
file, date of creation, date of modification, file size, file attributes, file
version, and extension, which helps in searching for and comparing similar files.
Foren6: Attackers use tools such as Foren6 to sniff the traffic of IoT devices.
Foren6 is a non-intrusive 6LoWPAN network analysis tool.
Gqrx: Gqrx is an SDR implemented with the help of the GNU Radio and Qt GUI tool.
Attackers use Gqrx to observe the frequency bands of temperature/humidity sensors,
light switches, car keys, M-bus transmitters, etc. Gqrx can also enable an attacker
to listen to or eavesdrop on radio FM frequencies or any radio conversations.
RFCrack: Attackers use the RFCrack tool to obtain the rolling code sent by the
victim to unlock a vehicle and later use the same code for unlocking and stealing
the vehicle.
China Chopper: Attackers use this web shell tool to gain remote control over target
web servers.
Astra: Attackers use the Astra tool to detect and exploit underlying
vulnerabilities in a REST API. Astra can discover and test authentications such
login and logout; this feature makes it easy for attackers to incorporate it into
the CICD pipeline.
Universal Radio Hacker: Universal Radio Hacker (URH) is software for investigating
unknown wireless protocols used by various IoT devices.
x64dbg: It is a debugging tool that can be used by security experts to identify the
language used for programming the malware, APIs that reveal its function, etc.
Based on the reconstructed assembly code, you can inspect the program logic and
recognize its threat potential.
Fing: Fing is a set of network tools that are used to identify all the devices
connected to any network, obtain the IP address, MAC address, device name, model,
and vendor of any connected device, and retrieve advanced information such as
NetBIOS, UPnP, Bonjour names, properties, and device types.
Cydia: Cydia is a software application for iOS that enables a user to find and
install software packages (including apps, interface customizations, and system
extensions) on a jailbroken iPhone, iPod Touch, or iPad.
Apricot: Apricot is a web-based mirror OS for the latest iPhones. It supports iOS
13.2 devices. Users can run this mirror iOS version with the default iOS 13.2
simultaneously. Apricot features provide a realistic experience for your iOS 13.2
iPhone.
pagestuff: The pagestuff utility can be used to view Mach-O executable files and
find information regarding the logical pages associated with those files. It also
helps security analysts to identify malicious code and Objective-C methods such as
deleteAppBySelf.
olevba: The olevba tool can be used to view the source code of all VBA macros
embedded within a document and to identify suspicious VBA keywords and obfuscation
methods used by malware.
ZeuS: ZeuS, also known as Zbot, is a powerful banking trojan that explicitly
attempts to steal confidential information like system information, online
credentials, and banking details, etc. Zeus is spread mainly through drive-by
downloads and phishing schemes.
BetterCAP: bettercap is an ARP poisoning tool and also it is the Swiss Army knife
for WiFi, Bluetooth Low Energy, wireless HID hijacking and Ethernet networks
reconnaissance and MITM attacks.
DNSRecon: DNSRecon is a zone enumeration tool that assists users in enumerating DNS
records such as A, AAAA, and CNAME. It also performs NSEC zone enumeration to
obtain DNS record files of a target domain.
Svmap: Svmap is an open-source scanner that identifies SIP devices and PBX servers
on a target network. It can be helpful for system administrators when used as a
network inventory tool.
Enyx: Enyx is an enumeration tool that fetches the IPv6 address of a machine
through SNMP.
Habu: is a hacking toolkit that provides various commands to perform ARP poisoning
attacks.
Secure Everything: Secure Everything uses AES encryption to secure SMS, videos,
images, audio files, etc. This tool also helps in securing credit card details,
bank account details, SSN, etc.
ike-scan: ike-scan discovers IKE hosts and can fingerprint them using the
retransmission backoff pattern.
AnDOSid: AnDOSid allows the attacker to simulate a DoS attack (an HTTP POST flood
attack to be precise) and DDoS attack on a web server from mobile phones.
Xplico: The goal of Xplico is extract from an internet traffic capture the
applications data contained. Xplico is an open source Network Forensic Analysis
Tool (NFAT). Xplico is released under the GNU General Public License.
Akamai: Akamai provides DDoS protection for enterprises regularly targeted by DDoS
attacks. Akamai Kona Site Defender delivers multi-layered defense that effectively
protects websites and web applications against the increasing threat,
sophistication, and scale of DDoS attacks.
Nmap: There are many tools, such as the Nmap that are available to use for the
detection of promiscuous mode. Nmap’s NSE script allows you to check if a target on
a local Ethernet has its network card in promiscuous mode. There is an NSE script
for nmap called sniffer-detect.nse which does just that. NAST: - it detects other
PC's in promiscuous mode by doing the ARP test.
FaceNiff: FaceNiff is an Android app that can sniff and intercept web session
profiles over the WiFi connected to the mobile. This app works on rooted android
devices. The Wi-Fi connection should be over Open, WEP, WPA-PSK, or WPA2-PSK
networks while sniffing the sessions.
Akamai: Akamai provides DDoS protection for enterprises regularly targeted by DDoS
attacks. Akamai Kona Site Defender delivers multi-layered defense that effectively
protects websites and web applications against the increasing threat,
sophistication, and scale of DDoS attacks.