RouterSploit: The Metasploit For Routers!

There are exploitation frameworks and then there is Metasploit. Though it has a few modules targeted towards embedded devices, it is your “general purpose” framework. If you are looking at a comprehensive¬†embedded devices/router exploitation framework you now have RouterSploit!

RouterSploit
RouterSploit: The Metasploit for Routers!

Continue reading “RouterSploit: The Metasploit For Routers!”

Jackhammer: A Vulnerability Assessment Collaboration Tool!

A lot many good things are being done in Docker. Jackhammer is another good example of this. The authors have gone ahead and put almost everything you would need for vulnerability assessment and vulnerability management, dockerized it, made it an all-in-one tool and put it up for us to use! A few other security related docker projects can be found here.

Jackhammer
Jackhammer

Continue reading “Jackhammer: A Vulnerability Assessment Collaboration Tool!”

Cameradar: Hack RTSP CCTV Cameras!

I stumbled upon this tool when trying to find more Docker security projects – Cameradar. You can use this tool post exploitation just for the fun, or use it in your own network and check for unauthorized CCTV installations. You can also use it to test the security of your existing camera setup.

Cameradar
Cameradar

Continue reading “Cameradar: Hack RTSP CCTV Cameras!”

Snorter: A automatic Snort, Barnyard2, and PulledPork Installer!

All of us know about Snort, the open-source, free and lightweight network intrusion detection system (NIDS) software for Linux & Windows to detect emerging threats. Also, all of us know that if you want to install Snort, Barnyard2 & PulledPork on a lot of machines, it get’s a lot more time consuming and well monotonous. This is where Snorter comes in the picture.

Snorter
Snorter

Continue reading “Snorter: A automatic Snort, Barnyard2, and PulledPork Installer!”

Docker IDA: The Large Scale Reverse Engineering System!

Docker containers are the future! It surely seems so from the myriad projects that are being ‘dockerized’! One such cool project is Docker IDA, your answer for large scale reverse engineering, which allows you to run IDA Pro disassembler in Docker containers for automating, scaling and distributing the use of IDAPython scripts.

Docker IDA
Docker IDA

Continue reading “Docker IDA: The Large Scale Reverse Engineering System!”

LIEF: Cross-Platform Library to Interact With ELF, PE and Mach-O Formats!

While there are multiple platform dependent libraries such as pefile, pyelftools, pwntools in Python and objdump and similar tools. Now, there is LIEF, an open source cross platform library to parse, modify and abstract ELF, PE and MachO file formats.

LIEF
LIEF

Continue reading “LIEF: Cross-Platform Library to Interact With ELF, PE and Mach-O Formats!”

Pwnbox: A Docker Container For Reverse Engineering & Exploitation!

Since I blogged a bit about docker security tools, I thought of continuing the trend and introduce Pwnbox, is an open source docker container that has tools to aid you in reverse engineering and exploitation. It allows you to package up an container with all of the tools of trade you need in a capture-the-flag situation, or elsewhere too!

Pwnbox
Pwnbox

Continue reading “Pwnbox: A Docker Container For Reverse Engineering & Exploitation!”