Jump to content

Yard-Tools

Inactive
  • Posts

    1,108
  • Joined

  • Last visited

1 Follower

About Yard-Tools

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

Yard-Tools's Achievements

Little Hacker

Little Hacker (8/13)

  • 250 Reactions Received Rare
  • 500 Reactions Received Rare
  • One Hundred Reactions Received Rare

Recent Badges

766

Reputation

  1. PacketstormSecurity Acaba de publicar lo siguiente: [HIDE-THANKS] Haga clic aquí para ver el artículo. [/HIDE-THANKS] Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace. [Hidden Content] 01-18-2018 08:55 PM
  2. PacketstormSecurity Acaba de publicar lo siguiente: [HIDE-THANKS] Haga clic aquí para ver el artículo. [/HIDE-THANKS] Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems. [Hidden Content] 01-18-2018 08:58 PM
  3. PacketstormSecurity Acaba de publicar lo siguiente: [HIDE-THANKS] Haga clic aquí para ver el artículo. [/HIDE-THANKS] cryptmount is a utility for creating and managing secure filing systems on GNU/Linux systems. After initial setup, it allows any user to mount or unmount filesystems on demand, solely by providing the decryption password, with any system devices needed to access the filing system being configured automatically. A wide variety of encryption schemes (provided by the kernel dm-crypt system and the libgcrypt library) can be used to protect both the filesystem and the access key. The protected filing systems can reside in either ordinary files or disk partitions. The package also supports encrypted swap partitions, and automatic configuration on system boot-up. [Hidden Content] 01-18-2018 09:59 PM
  4. PacketstormSecurity Acaba de publicar lo siguiente: [HIDE-THANKS] Haga clic aquí para ver el artículo. [/HIDE-THANKS] This is the first version of a mostly working firmware for the ChameleonMini RevE rebooted device. It compiles without errors or warnings and gives you more or less the same functionality as the stock firmware. This release is fully compatible with the GUI software that is bundled with the device upon purchase. [Hidden Content] 01-19-2018 03:51 PM
  5. PacketstormSecurity Acaba de publicar lo siguiente: [HIDE-THANKS] Haga clic aquí para ver el artículo. [/HIDE-THANKS] Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. [Hidden Content] 01-12-2018 01:31 AM
  6. PacketstormSecurity Acaba de publicar lo siguiente: [HIDE-THANKS] Haga clic aquí para ver el artículo. [/HIDE-THANKS] Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems. [Hidden Content] 01-13-2018 12:48 AM
  7. PacketstormSecurity Acaba de publicar lo siguiente: [HIDE-THANKS] Haga clic aquí para ver el artículo. [/HIDE-THANKS] cryptmount is a utility for creating and managing secure filing systems on GNU/Linux systems. After initial setup, it allows any user to mount or unmount filesystems on demand, solely by providing the decryption password, with any system devices needed to access the filing system being configured automatically. A wide variety of encryption schemes (provided by the kernel dm-crypt system and the libgcrypt library) can be used to protect both the filesystem and the access key. The protected filing systems can reside in either ordinary files or disk partitions. The package also supports encrypted swap partitions, and automatic configuration on system boot-up. [Hidden Content] 01-13-2018 01:03 AM
  8. PacketstormSecurity Acaba de publicar lo siguiente: [HIDE-THANKS] Haga clic aquí para ver el artículo. [/HIDE-THANKS] SSLsplit is a tool for man-in-the-middle attacks against SSL/TLS encrypted network connections. Connections are transparently intercepted through a network address translation engine and redirected to SSLsplit. SSLsplit terminates SSL/TLS and initiates a new SSL/TLS connection to the original destination address, while logging all data transmitted. SSLsplit is intended to be useful for network forensics and penetration testing. [Hidden Content] 01-15-2018 05:21 PM
  9. PacketstormSecurity Acaba de publicar lo siguiente: [HIDE-THANKS] Haga clic aquí para ver el artículo. [/HIDE-THANKS] THC-IPV6 is a toolkit that attacks the inherent protocol weaknesses of IPv6 and ICMP6 and it includes an easy to use packet factory library. [Hidden Content] 01-09-2018 06:38 PM
  10. PacketstormSecurity Acaba de publicar lo siguiente: [HIDE-THANKS] Haga clic aquí para ver el artículo. [/HIDE-THANKS] Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). [Hidden Content] 01-09-2018 05:41 PM
  11. PacketstormSecurity Acaba de publicar lo siguiente: [HIDE-THANKS] Haga clic aquí para ver el artículo. [/HIDE-THANKS] Wapiti is a web application vulnerability scanner. It will scan the web pages of a deployed web application and will fuzz the URL parameters and forms to find common web vulnerabilities. [Hidden Content] 01-03-2018 06:26 PM
  12. PacketstormSecurity Acaba de publicar lo siguiente: [HIDE-THANKS] Haga clic aquí para ver el artículo. [/HIDE-THANKS] Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault. [Hidden Content] 12-29-2017 04:24 PM
  13. PacketstormSecurity Acaba de publicar lo siguiente: [HIDE-THANKS] Haga clic aquí para ver el artículo. [/HIDE-THANKS] Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems. [Hidden Content] 12-29-2017 05:26 PM
  14. PacketstormSecurity Acaba de publicar lo siguiente: [HIDE-THANKS] Haga clic aquí para ver el artículo. [/HIDE-THANKS] GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. [Hidden Content] 12-29-2017 05:28 PM
  15. PacketstormSecurity Acaba de publicar lo siguiente: [HIDE-THANKS] Haga clic aquí para ver el artículo. [/HIDE-THANKS] Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information. [Hidden Content] 12-21-2017 09:21 PM

Chat Room

Chat Room

Chatroom Rules

No support in chat, open a thread.

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.