Security List Network™
Follow Us on FacebookFollow Us on Google+Follow Us on TwitterFollow Us on Pinterest
Menu
  • Home
  • About Us
  • Security Archives
  • Partners
Menu
  • Automation
  • Browser
  • Brute Force
  • Code Scripting
  • Cryptography
  • Encryption
  • Exploits
  • Framework
  • Linux Security Distros
  • Mobile Applications Tools
    • Android Tools
    • iPhone Tools
  • Networking
    • Bluetooth
    • Monitoring/System Administrator
    • Network Mapping/Scanner
    • Packet Sniffer/Sniffing
    • Internet Security
    • Spoofing/Spoofer
    • Wireless/wifi
  • Penetration Test
    • BenchMark
    • Cross Site Scripting(XSS)
    • Fuzzer/Fuzzing
    • Sql Injection
    • Stress Testing
  • Security Tools
    • Anti Malware/Virus – Malware Analysis
    • Firewall
    • Intrussion Detection and Prevention System(IDS/IPS)
    • Registry Analysis

SITEMAP

Archives

Browse: Home   /   ghost   /   Page 2
fesk - Firewall Easy Setup Kit.

fesk – Firewall Easy Setup Kit.

November 18, 2017
ghost
Firewall, Networking

FESK is a handy firewall with a configurable set of standard rules and quick port settings. In e.x for penetration testing Web instances or apps….

Read Article →
fatcat - FAT filesystems explore, extract, repair, and forensics tool.

fatcat – FAT filesystems explore, extract, repair, and forensics tool.

October 28, 2017
ghost
Digital Forensics

fatcat tool is designed to manipulate FAT filesystems, in order to explore, extract, repair, recover and forensic them. It currently supports FAT12, FAT16 and FAT32….

Read Article →
cacador - Indicator of compromise (IOC) Extractor.

cacador – Indicator of compromise (IOC) Extractor.

October 13, 2017
ghost
Code Scripting, Digital Forensics

Cacador (Portugese for hunter) is tool for extracting common indicators of compromise from a block of text. What is Indicator of compromise (IOC): Indicator of…

Read Article →
BlobRunner - Quickly debugging shellcode extracted during malware analysis.

BlobRunner – Quickly debugging shellcode extracted during malware analysis.

September 28, 2017
ghost
Anti Malware/Virus - Malware Analysis, Code Scripting

BlobRunner is a simple tool to quickly debug shellcode extracted during malware analysis. BlobRunner allocates memory for the target file and jumps to the base…

Read Article →
FirewallRules - Simple PowerShell script to quickly add Windows Firewall Rules.

FirewallRules – Simple PowerShell script to quickly add Windows Firewall Rules.

September 14, 2017
ghost
Code Scripting, Firewall

FirewallRules is a Simple PowerShell script to quickly add Windows Firewall Rules. Script must be run from an Administrator prompt otherwise you will not have…

Read Article →
connect-or-cut : Prevent connections to blocked addresses in COMMAND.

connect-or-cut : Prevent connections to blocked addresses in COMMAND.

August 24, 2017
ghost
Firewall, Internet Security

What it is? connect-or-cut is a small library to interpose with LD_PRELOAD to a program to prevent it from connecting where it should not. This…

Read Article →
Hostsblock - An ad- and malware-blocking script for Linux.

Hostsblock – An ad- and malware-blocking script for Linux.

August 3, 2017
ghost
Anti Malware/Virus - Malware Analysis, Networking

Hostsblock is a bash script designed to take advantage of /etc/hosts file to provide system-wide blocking of internet advertisements, malicious domains, trackers, and other undesirable…

Read Article →
bofhwall - Bastard Operator From Hell Firewall.

bofhwall – Bastard Operator From Hell Firewall.

July 5, 2017
ghost
Code Scripting, Firewall

(BOFHWALL)Bastard Operator From Hell Firewall can send message to online port scanners, like: Shodan scanners, raw port scanners, port analyzers. You can redirect some ports…

Read Article →
← Previous 1 2 3 … 8 Next →

Copyright © 2022

Powered by Worldwide CyberSecurity Team.

  • Digital Forensics
  • Networking
  • Penetration Test
  • Security Tools