Quest Identity Manager for Unix lets you remotely manage local users and groups on Unix, Linux, and Mac systems. It lets you find and manage existing local Unix users and groups throughout your environment through a single, centralized management console. You can create new local Unix users and groups throughout your environment from the same centralized management console. Local Unix user and group information can be securely managed over SSH. The management console can be run from Unix, Linux, Windows, or Mac platforms and any of the most common Web browsers. Quest Identity Manager for Unix can provide granular reports on Unix identity information, including local Unix users, local user conflicts, and all members of specific Unix groups. It can uncover rogue or unused local accounts.
Peludo is a system that provides a toolchain and a runtime to create and launch self-contained, platform independent, injectable, network transportable, non-static applications that can be dynamically extended on-demand. From a security assessment perspective, it could be seen as a tool to create advanced payloads: entire libraries and multithreading programs can be deployed over the network without touching the target file system.
Armitage is a graphical cyber attack management tool for Metasploit that visualizes your targets, recommends exploits, and exposes the advanced capabilities of the framework. Armitage aims to make Metasploit usable for security practitioners who understand hacking but don't use Metasploit every day. If you want to learn Metasploit and grow into the advanced features, Armitage can help you.
LPVS (Linux Package Vulnerability Scanner) is a Linux distribution news feed based package version scanner that shows which security advisories apply to your system, which packages are installed in a vulnerable version, and to which versions you should upgrade. Currently supported distributions: Ubuntu and CentOS.
Bletchley is a real-world cryptanalysis framework. It was created to assist with the detection, analysis, and exploitation of cryptographic flaws and aims to help automate the tedious aspects of this analysis while leaving the security expert in control of the process. It features automated token encoding detection (36 encoding variants), passive ciphertext block length and repetition analysis, a script generator for efficient automation of HTTP requests, and a flexible, multithreaded padding oracle attack library with CBC-R support.