logo

subglobal1 link | subglobal1 link | subglobal1 link | subglobal1 link | subglobal1 link | subglobal1 link | subglobal1 link
subglobal2 link | subglobal2 link | subglobal2 link | subglobal2 link | subglobal2 link | subglobal2 link | subglobal2 link
subglobal3 link | subglobal3 link | subglobal3 link | subglobal3 link | subglobal3 link | subglobal3 link | subglobal3 link
subglobal4 link | subglobal4 link | subglobal4 link | subglobal4 link | subglobal4 link | subglobal4 link | subglobal4 link
subglobal5 link | subglobal5 link | subglobal5 link | subglobal5 link | subglobal5 link | subglobal5 link | subglobal5 link
subglobal6 link | subglobal6 link | subglobal6 link | subglobal6 link | subglobal6 link | subglobal6 link | subglobal6 link
subglobal7 link | subglobal7 link | subglobal7 link | subglobal7 link | subglobal7 link | subglobal7 link | subglobal7 link
subglobal8 link | subglobal8 link | subglobal8 link | subglobal8 link | subglobal8 link | subglobal8 link | subglobal8 link

...a fresh perspective, a different approach...

resources and tools

Resources

 

 

CSRgroup has developed or modified several tools for use during pentesting and assessments. We are happy to release several of these tools to the security community at large, as our way of giving back to the community.

If you find a bug or have a modification you would like us to add, send an email to tools _@_csr-group.com. Please note, that these tools are provided "as is" and are intended to be used for legal purposes only. Unless otherwise noted, all are released under GPL



WARNING
: Some of these tools contain files that may trigger Anti Virus programs.

ARPSPOOF:  Originally written by Dug Song as part of the DSNIFF suite of tools, seems that (at least the version that we found) it is hard coded to work on eth0 only. Not a huge problem unless you want it to work over wireless! So, we modified it to work over any given interface. The catch is that it is old and requires a bunch of older files as dependencies. We have the modified arpspoof.c file and also a modified binary version that will work fine on BackTrack3 and Backtrack4.

DATAPIPEDatapipe is a port redirector written by Jeff Lawson that runs on both Windows and Unix. The modified CSRgroup version of datapipe accepts standard input to increase stealth when datapipe is run on Unix

SCRIPT TOOL: is a utility similar to the Unix version of "script" for use in a windows command shell. During pentesting, it is advisable to keep a copy of all your keystrokes for future reference. Unfortunately, we never could find a decent scripting tool to do this. Luckily, a friend of ours wrote this for us, and we are happy to provide a binary for your use. MD5: 67fc697f91e1c764cd2fc8a9955c4eb2

| Privacy Policy | Contact Us | ©2008 CSRgroup - All Rights Reserved