Packages that are used to protect a user from malware & attacks from other users.


Tool count: 32

BlackArch defensive
Name Version Description Homepage
arpon 2.7 A portable handler daemon that make ARP protocol secure in order to avoid the Man In The Middle (MITM) attack through ARP Spoofing, ARP Cache Poisoning or ARP Poison Routing (APR) attacks.
arpstraw 27.ab40e13 Arp spoof detection tool.
artillery 252.6f0a557 A combination of a honeypot, file-system monitoring, system hardening, and overall health of a server to create a comprehensive way to secure a system.
artlas 140.728aea5 Apache Real Time Logs Analyzer System.
chkrootkit 0.53 Checks for rootkits on a system
detect-sniffer 151.63f0d7f Tool that detects sniffers in the network.
fastnetmon v1.1.4.r29.ge55b083 High performance DoS/DDoS load analyzer built on top of multiple packet capture engines.
fssb 73.51d2ac2 A low-level filesystem sandbox for Linux using syscall intercepts.
ifchk 1.1.1 A network interface promiscuous mode detection tool.
inetsim 1.2.8 A software suite for simulating common internet services in a lab environment, e.g. for analyzing the network behaviour of unknown malware samples.
jhead 3.03 EXIF JPEG info parser and thumbnail remover
lorg 98.aa4f1a3 Apache Logfile Security Analyzer.
malice 0.3.28 VirusTotal Wanna Be - Now with 100% more Hipster.
malmon 0.3 Hosting exploit/backdoor detection daemon.
maltrail 10393.3e0e2b981 Malicious traffic detection system.
mat 0.6.1 Metadata Anonymisation Toolkit composed of a GUI application, a CLI application and a library.
mat2 0.8.0 A metadata removal tool, supporting a wide range of commonly used file formats.
nipe 217.fd9728c A script to make Tor Network your default gateway.
portspoof 128.8b5596a This program's primary goal is to enhance OS security through a set of new techniques.
prowler 682.8f85245 Tool for AWS security assessment, auditing and hardening.
quicksand-lite 28.857210e Command line tool for scanning streams within office documents plus xor db attack.
sniffjoke 772.434bfb1 Injects packets in the transmission flow that are able to seriously disturb passive analysis like sniffing, interception and low level information theft.
snort 2.9.13 A lightweight network intrusion detection system.
sooty 70.534b463 The SOC Analysts all-in-one CLI tool to automate and speed up workflow.
suricata 4.1.4 An Open Source Next Generation Intrusion Detection and Prevention Engine.
tabi 13.068a406 BGP Hijack Detection.
tor-autocircuit 0.2 Tor Autocircuit was developed to give users a finer control over Tor circuit creation. The tool exposes the functionality of TorCtl library which allows its users to control circuit length, speed, geolocation, and other parameters.
tor-browser-en 8.5.3 Tor Browser Bundle: anonymous browsing using Firefox and Tor.
tor-router 4.001a510 A tool that allow you to make TOR your default gateway and send all internet connections under TOR (as transparent proxy) for increase privacy/anonymity without extra unnecessary code.
truecrypt 7.1a Free open-source cross-platform disk encryption software
tyton 1.2 Kernel-Mode Rootkit Hunter.
zeus 107.da38d0d AWS Auditing & Hardening Tool.