Open Source IT Security Tools by Core Security

Open Source IT Security Tools by Core Security

Below is an index of projects that members of the CoreLabs team have pursued. Click on any title to access more information about the project.

Titlesort descending Excerpt
A Penetration Testing Research Framework

Penetration testing remains a required practice for the security-aware...

Agafi

Agafi (Advanced Gadget Finder) is a x86 gadget-finder tool useful to find...

Attack Payloads

Crypto and standard attack techniques can be combined with payload...

Attack Planning

Today penetration testing is a highly manual practice, which requires an...

Attack Simulation

Computer systems and networks are exposed to attacks on a daily basis. IT...

Attacker-centric Risk Assessment Metrics

Risk assessment can be used to measure the security posture of an...

Aureliax

Aureliax shows differences between decompiled functions. It displays their...

BIOS rootkits

Traditionally rootkit research has focused on accomplishing...

Bug Reproducer Assistant

Bug-reproducer Assistant is a tool that extracts behavior from live running...

Bugweek

The Bugweek is a research activity wherein the security professionals in the...

Core CloudInspect

We are concerned with using the elasticity of public clouds to improve the...

CORE FORCE

CORE FORCE® is a free comprehensive endpoint security solution for Windows...

CORE GRASP

CORE GRASP is a web application protection software technique designed by ...

CORE TRUSS and Secure Triggers

This project relates to a software protection framework that we designed....

Core Wisdom

CORE WISDOM is a suite of tools designed for the secure auditing of...

CORETEX

Coretex is a series of programming competitions organized by Core in...

eXait

eXait is a benchmark-like tool to test all the anti-instrumentation...

Exomind

The proliferation of social network services has produced an extensive...

Gfuzz

Gfuzz is a web application fuzzing environment which combines fine-grained...

Heappie

Heappie! is an exploit-writing-oriented memory analysis tool. It assists...

InlineEgg

InlineEgg is a Python module that provides the user with a toolbox of...

iPhoneDbg Toolkit

This set of tools will enable you to delve into iPhone Binary Reversing....

IterDe

While reversing code there's usually a common limitation in testing the new...

MD5 collisions

After Dr. Wang presented the MD5 collisions at Crypto '05, Gera's researched...

MSyslog

MSyslog is a logging subsystem for UNIX operating systems. It replaces the...

ND2DB Attack

Within this project we research a new attack technique that allows...

Non-Euclidean Ring Data Scrambler (NERDS) public-key encryption

With the advent of PDAs and other constrained computing environments come...

Open XML Advisory Format

Open XML Advisory Format is an XML format developed to assist researchers...

Pass-The-Hash Toolkit

The Pass-The-Hash Toolkit contains utilities to manipulate the Windows Logon...

Protocol design flaws

Aside from the traditional vulnerability analysis in which we explore known...

Public-Key Cryptography Based on Polynomial Equations

One of the challenges public-key cryptography faces is the absence of...

PyCodin

PyCodin is an open source Python library that allows instrumentation of low-...

PyLorcon2

PyLorcon2 is a wrapper that allows using the Lorcon2 - Loss of Radio...

Pysap

SAP Netweaver [1] is a technology platform for building and integrating SAP...

SDT Cleaner

SDT Cleaner is a tool that intends to clean the SSDT (system service...

Sentinel

Sentinel is a command line tool able to protect Windows 32 bit programs...

SQL Agent

We introduce the SQL Agent technique and implementation, an efficient...

Teaching Penetration Testing

We are devising lessons and tools for using in a class of information...

Turbodiff

Turbodiff is a binary diffing tool developed as an IDA plugin. It discovers...

Uhooker

The Universal Hooker is a tool to intercept execution of programs. It...

Using neural networks for OS fingerprinting

The problem of remote Operating System (OS) Detection, also called OS...

wiwo (Wireless Workers)

What is wiwo?
wiwo is a distributed 802.11 monitoring...

WPA Migration Mode patches for aircrack-ng and Kismet

The WPA Migration Mode patches for the Aircrack-ng suite (aircrack-ng.org)...

WPSIG

It's a simple tool (written in Python) that does information gathering using...

wwtool

wwtool is a wireless scanning tool that uses the Windows Native WiFi API to...