THE

SPRAWL

  •  
  •  
  •  
  • sprawllatest

    i am rebel: phreaks and geeks

    A documentary produced by National Geographic about the life and exploits of Kevin Mitnick. The documentary features a number of interviews ranging from book authors, journalists, friends and an addiction specialist who worked with Kevin. Read more.

    flare-vm

    Download Not Available
    Size Not Available
    DateJuly 26th, 2017
    Version1.0

    FLARE VM is a fully customizable, Windows-based security distribution for malware analysis, incident response, penetration testing, etc. Read more.

    fakenet-ng

    Download fakenet1.3.zip
    Size 6.8 MB
    DateAugust 3rd, 2016
    Version1.3

    FakeNet-NG is a next generation dynamic network analysis tool for malware analysts and penetration testers. It is open source and designed for the latest versions of Windows (and Linux, for certain modes of operation). FakeNet-NG is based on the excellent Fakenet tool developed by Andrew Honig and Michael Sikorski.

    The tool allows you to intercept and redirect all or specific network traffic while simulating legitimate network services. Using FakeNet-NG, malware analysts can quickly identify malware's functionality and capture network signatures. Penetration testers and bug hunters will find FakeNet-NG's configurable interception engine and modular framework highly useful when testing application's specific functionality and prototyping PoCs. Read more.

    19 jul
    2015
    spam nation

    Spam Nation is a non-fiction book written by Brian Krebs, a well known journalist and the author of the KrebsOnSecurity.com blog. The book's primary focus is on the cybercrime coming from the post-Soviet states, especially related to spam. The main story line revolves around Pavel Vrublevsky and Igor Gusev, two partners in crime who, like in a classic gangster flick, become enemies and start an all out war of attrition - “Pharma Wars”. Bribing politicians, hiring FSB agents, hacking and leaking each other's databases anything goes in this personal fight. Along the way you will learn about the inner workings of the massive spam operations and the political, criminal, financial, and social forces that drive them. Read more.

    the 414s: the original teenage hackers

    A short documentary by Michael T. Vollmann explores the birth, the exploits, and the eventual demise of The 414s - a hacker group active in the early 1980s until the summer of 1983. The documentary offers an interesting look into the early innocent days of hacking, especially just how influential the movie Wargames was to bring mainstream recognition. At the same time, the ease with which The 414s could penetrate even the more sensitive computers and the lack of laws to prosecute the adult members of the group resulted in the series of laws including the infamous Computer Fraud and Abuse Act (CFAA) of 1986. Read more.

    dnschef

    Download dnschef-0.3.zip
    Size 2.5 MB
    DateNovember 6th, 2014
    Version0.3

    DNSChef is a highly configurable DNS Proxy for Penetration Testers and Malware Analysts. It is capable of fine configuration of which DNS replies to modify or to simply proxy with real responses.

    Version 0.3 introduces support for more DNS record types, DNSSEC, logging, more configurable remote nameservers, support for the updated dnslib library and several bug fixes.

    Version 0.2 introduces IPv6 support, large number of new DNS record types, custom ports and other frequently requested features. Read more.

    01 oct
    2014
    exodus - vuln-dev - master class

    A few weeks ago I had a great pleasure of studying at a week-long training taught by Exodus Intelligence. The Vulnerability Development - Master Class was taught by Aaron Portnoy, Zef Cekaj, and Peter Vreugdenhil. The class had an excellent presentation of two complementary yet unique subjects of vulnerability discovery and exploit development primarily under Windows environment. The instructors are truly masters of their field which was reflected in the great quality and depth of the material.

    While it is still fresh in my mind, I would like to share with you some of the notes on the covered subjects, the recommended prerequisites, and tips on how to get the most out of this very intensive training. Read more.

    ida sploiter

    Download idasploiter-1.0.zip
    Size 25.4 KB
    DateSeptember 14th, 2014
    Version1.0

    IDA Sploiter is a plugin for Hex-Ray's IDA Pro disassembler designed to enhance IDA's capabilities as an exploit development and vulnerability research tool. Some of the plugin's features include a powerful ROP gadgets search engine, semantic gadget analysis and filtering, interactive ROP chain builder, stack pivot analysis, writable function pointer search, cyclic memory pattern generation and offset analysis, detection of bad characters and memory holes, and many others. Read more.



    π
    ///\oo/\\\