This page is a repository for the great and innovative tools that have accompanied DEF CON talks over the years. DEF CON 16 content was graciously collected and brought to you by Rob Fuller, (aka Mubix) of Room362.com If you know of a newer version of the tools or have a correction, send them to neil [at] defcon ]dot[ org.
Tools Released at DEF CON 18
by Jeff Bryner
- Description: snoops out cookies, bookmarks, emails and favorite icon traffic from the google toolbar's network traffic.
- Homepage Link: http://jeffbryner.com/ http://p0wnlabs.com
- Email Address: jeff [at] jeffbryner ]dot[ com
- Tool URL: http://p0wnlabs.com/defcon18/defcon18.zip
- Local Copy: https://media.defcon.org/DEF CON 18/DEF CON 18 tools/DEF CON 18 - gtoolbarsnoop.zip
- Description FOCA is a tool for Windows Systems that allows pentester to perform a tactical fingerprinting using metadata, DNS information, search engines and public files.
- Homepage Link: http://www.informatica64.com/FOCA
- Email Address: amigosdelafoca [at] informatica64 ]dot[ com
by James Shewmaker
- Description: x06d is a Browser Enhancement Proof of Concept that defends against a variety of attacks on privacy.
- Homepage Link: http://sourceforge.net/projects/x06d/
by Francis Brown and Rob Ragan
- Description: A search engine hacking tool designed to perform information gathering on multiple targets leveraging Google and Bing.
- Homepage Link: http://www.stachliu.com/index.php/resources/tools/google-hacking-diggity-project/
- Email Address: diggity [at] stachliu ]dot[ com
- Local Copy: https://media.defcon.org/DEF CON 18/DEF CON 18 tools/DEF CON 18 - searchdiggity.zip
DotNetasploit - Gray Dragon - Visual Studio xMe - Beta
by Jon McCoy
- Description: DotNetasploit is a software system that allows .NET payloads to be used against running .NET applications.
- Homepage Link: www.DigitalBodyGuard.com
- Email Address: DefCon18 [at] DigitalBodyGuard ]dot[ com
- Local Copy: https://media.defcon.org/DEF CON 18/DEF CON 18 tools/DEF CON 18 - DotNetasploitEXE.rar
FOE (Feed Over Email)
by Sho Ho
- Description: Users in Internet censored countries often find themselves unable to access foreign news websites or RSS feeds such as the ones from Voice of America, CNN, BBC, etc. Until now, the only way users in censored countries can access these websites is to use a proxy server or install a proxy software on their computer. FOE (Feed Over Email) is a new tool that allows users to receive RSS feeds from foreign websites without the need to find a working proxy server or install any proxy software. Technically, FOE is built on top of SMTP and work on most email servers as long as the user has access to POP3 and SMTP.
- Homepage Link: http://code.google.com/p/foe-project/
by Patrick Thomas
- Description: The BlindElephant Web Application Fingerprinter attempts to discover the version of a (known) web application by comparing static files at known locations against precomputed hashes for versions of those files in all all available releases. The technique is fast, low-bandwidth, non-invasive, generic, and highly automatable.
- Homepage Link: http://blindelephant.sourceforge.net/
- Email: pst [at] coffeetocode ]dot[ net
Exploiting WebSphere Application Server's JSP Engine
by Ed Schaller
- Homepage Link: http://www.darkmist.net/~schallee/defcon18/
- Local Copy: https://media.defcon.org/DEF CON 18/DEF CON 18 tools/DEF CON 18 - WAS-JSP-src-1.0.0.zip
Francisco Amato and Federico Kirschbaum
- Description: ISR-evilgrade: is a modular framework that allow us to take advantage of poor upgrade implementations by injecting fake updates.
- Homepage Link: http://www.infobyte.com.ar/developments.html
- Email: Francisco Amato – famato [at] infobytesec ]dot[ com, Federico Kirschbaum – fedek [at] infobytesec ]dot[ com
- Local Copy: https://media.defcon.org/DEF CON 18/DEF CON 18 tools/DEF CON 18 - isr-evilgrade-1.0.0.tar.gz
Tools from: Training the Next Generation of Hardware Hackers
by Andrew Kongs and Dr. Gerald Kane
- Description: Hardware hacking can be lots of fun but can be very intimidating getting started. Andrew Kongs and Dr. Gerald Kane wanted to spread the hardware hacking culture to others and saw incoming college engineering freshman as the perfect crowd to indoctrinate. They developed a set of hardware and software tools to help their incoming students play with low-level software and embedded systems.
After sharing the tools with their student audience, they want to share the tools they built with everyone so that those interested can get their feet wet. Want to learn more about the nitty gritty of how microcontrollers and how embedded systems tick (and how to break them) without diving in eyeballs deep? So do many people and the guys from the University of Tulsa are here to help.
- Homepage Link: http://ee.base2.us/
by Wayne Huang
- Description: Drive-by download testing framework for metasploit.
- Homepage Link: http://www.drivesploit.org/
- Latest Release: git://github.com/waynearmorize/drivesploit
by Monta Elkins
- Description: Do you check every USB plug on your computer before you log-in? Didn't think so... URFUKED is used to take over the user's keyboard input and quickly execute preprogrammed attacks with the user's privileges.
- Homepage Link: http://www.hackerwarrior.com/urfuked
- Description: A tool for securing RIA Flash Content before using it.
- Homepage Link: http://blitzableiter.recurity.com/
- Local Copy: https://media.defcon.org/DEF CON 18/DEF CON 18 tools/DEF CON 18 - Blitzableiter.rev175.binary.zip
by Frank Breedjik
- Description: Seccubus automates regular vulnerability scans with Nessus and OpenVAS and provides delta reporting. Seccubus effectively reduces the analysis time for subsequent scans of the same infrastructure by only reporting delta findings.
- Homepage Link: http://www.seccubus.com/
- Local Copy: https://media.defcon.org/DEF CON 18/DEF CON 18 tools/DEF CON 18 - Seccubus-1.5.2.tar.gz
Tools from: Breaking Bluetooth
by JP Dunning
- Homepage Link: www.hackfromacave.com
- SpoofTooph: http://www.hackfromacave.com/projects/spooftooph.html
- Bluetooth Profiling Project: http://www.hackfromacave.com/projects/bpp.html
- vCardBlaster: www.hackfromacave.com/vcardblaster.html
- Blueper: www.hackfromacave.com/blueper.html
- Pwntooth: www.hackfromacave.com/pwntooth.html
- Local Copy: https://media.defcon.org/DEF%20CON%2018/DEF%20CON%2018%20tools/DEF%20CON%2018%20-%20bluetooth.zip
by Patrick Mullen and Ryan Pentney
- Description: Razorback is...
● An Open Source framework (GPLv2) to enable advanced processing of data and detection of events
● Able to get data as it traverses the network
● Able to get data after it's received by a server
● Able to perform advanced event correlation
● …Our answer to an evolving threat landscape
- Homepage links: http://sourceforge.net/projects/razorbacktm, http://sourceforge.net/projects/nuggetfarm
- Local Copy: https://media.defcon.org/DEF%20CON%2018/DEF%20CON%2018%20tools/DEF%20CON%2018%20-%20razorback.zip
Tools Released at DEF CON 16
by Nick Harbour
- Description: (pending update)
- Homepage Link: http://www.rnicrosoft.net/
- Email Address: nick.harbour [at] gmail ]dot[ com
- Local Copy: https://media.defcon.org/dc-16/tools/PEScrambler_v0_1.zip
by Guy Martin
- Description: "A real time packet processor" - It extracts and can reinject packets. This includes VoIP calls in real time, Cable Modem (DOCSIS) traffic, and a whole host of others.
- Homepage Link: http://www.packet-o-matic.org/
- Email Address: gmsoft [at] tuxicoman ]dot[ be
- Local Copy: https://media.defcon.org/dc-16/tools/packet-o-matic-svn-20080814.tar.gz
- Description: A GUI SQL Injection tool that creates SQL injection queries and brakes the 64k barrier using MS Debugger.
- Homepage Link: http://securestate.com/pages/free-tools.aspx
- Local Copy: https://media.defcon.org/dc-16/tools/sa_exploiter.rar
- Description: A python based tool that automates several different types of attacks including Metasploit's Autopwn and SQL Injection
- Homepage Link: http://securestate.com/pages/free-tools.aspx
- Local Copy: https://media.defcon.org/dc-16/tools/fasttrack.tgz
by Nelson Murilo and Luis Eduardo
- Description: An open source wireless IDS program
- Homepage Link: http://www.beholderwireless.org/
- Email Address: bh [at] beholderwireless ]dot[ org
- Local Copy: https://media.defcon.org/dc-16/tools/beholder_wireless-0.8.6.tgz
by Joe Grand (Kingpin) and Zoz
- Description: A gadget that interfaces between a computer and a VGA monitor and flashes a fake BSOD (Blue Screen of Death) at random time intervals or when triggered by an infrared remote control.
- Homepage Link: http://www.bsodomizer.com
- Email Address: kp [at] kingpinempire ]dot[ com
by Jay Beale
- Description: The end-all be-all of MITM tools
- Homepage Link: http://code.google.com/p/middler/
- Alternate Link: http://www.inguardians.com/tools/
- Download Link: http://middler.googlecode.com/files/middler-1.0.tgz
by Jay Beale
- Description: An open source inline "transparent" client-side IPS
- Homepage Link: http://www.ClientIPS.org/ (Online?)
by Daniel Kachakill
- Description: A Blind SQL Injection tool based on heavy queries
- Download Link: http://www.codeplex.com/marathontool
- Email Address: dani [at] kachakil ]dot[ com
- Local Copy: https://media.defcon.org/dc-16/tools/MarathonTool.zip
The Phantom Protocol
by Magnus Brading
- Description: A Tor-like protocol that fixes some of Tor's major attack vectors
- Homepage Link: http://code.google.com/p/phantom
- Email Address: brading [at] fortego ]dot[ se
by Mark Bristow
- Description: A SCADA Modbus Network Scanner
- Homepage Link: http://modscan.googlecode.com/
- Email Address: mark.bristow [at] gmail ]dot[ com
- Local Copy: https://media.defcon.org/dc-16/tools/modscan_0.1.tar
by David Byrne
- Description: Web Application scanner that searches for logic and design flaws as well as the standard flaw seen in the wild today (SQL Injection, XSS, CSRF)
- Homepage Link: http://grendel-scan.com/
iKatinteractive Kiosk Attack Tool
by Paul Craig
(This site has an image as a banner that is definitely not safe for work! You have been warned)
- Description: A web site that is dedicated to helping you break out of Kiosk jails
- Homepage Link: http://ikat.ha.cked.net
- Email Address: paul.craig [at] security-assessment ]dot[ com
by Jan P. Monsch and Raffael Marty
- Description: A SLAX based Linux Distro that is geared toward data/log visualization
- Homepage Link: http://code.google.com/p/davix/
- Download Link: http://www.geekceo.com/davix/davix-0.5.0.iso.gz
- Email Addresses: jan.monsch [at] iplosion ]dot[ com and raffy [at] secviz ]dot[ org
by Chris Eagle and Tim Vidas
- Description: An IDA Pro plugin with a server backend that allows multiple people to collaborate on a single RE (reverse engineering) project.
- Homepage Link: http://www.idabook.com/defcon
- Email Addresses: cseagle [at] gmail ]dot[ com and tvidas [at] gmail ]dot[ com
VMware Pen-Testing Framework
by John Fitzpatrick
- Description: A collection of tools created to pen-test VMware environments
- Homepage: http://labs.mwrinfosecurity.com
- Email Address: john.fitzpatrick [at] mwrinfosecurity ]dot[ com
- Description: A tool for organizing and sharing information during a penetration test
- Homepage: http://dradis.sourceforge.net
- Email Address: etd [at] nomejortu ]dot[ com
- Local Copy: https://media.defcon.org/dc-16/tools/dradis-v2.1.1.tar.gz & https://media.defcon.org/dc-16/tools/dradis-v2.1.1-setup.exe
by Kurt Grutzmacher
- Description: A rogue server with controlling desires that steals NTLM hashes.
- Homepage: http://code.google.com/p/squirtle
- Email Address: grutz [at] jingojango ]dot[ net
- Local Copy: https://media.defcon.org/dc-16/tools/squirtle-1.1a.zip
- Description: A script that can hide other scripts such as CSRF and iframes in spaces and tabs
- Download Link: DEF CON 16 CD
- Description: VoIP automated fuzzing tool with support for a large number of VoIP applications and protocols
- Homepage Link: http://voiper.sourceforge.net/
- Local Copy: https://media.defcon.org/dc-16/tools/voiper-0.07.tar.gz
by Errata Security
- Description: A browser plugin that pen-tests every site that you visit.
- Homepage Link: http://www.erratasec.com
- Email Address: sales [at] erratasec ]dot[ com
by Ponte Technologies
- Description: An advanced network flow visualization tool that is not solely based on time.
- Homepage Link: http://psyche.pontetec.com/
- Local Copy: https://media.defcon.org/dc-16/tools/psyche-0.4.tar.gz