Packages that are used to protect a user from malware & attacks from other users.

Tool count: 35

BlackArch defensive
Name Version Description Homepage
arpon 2.7 A portable handler daemon that make ARP protocol secure in order to avoid the Man In The Middle (MITM) attack through ARP Spoofing, ARP Cache Poisoning or ARP Poison Routing (APR) attacks.
arpstraw 27.ab40e13 Arp spoof detection tool.
artillery 252.6f0a557 A combination of a honeypot, file-system monitoring, system hardening, and overall health of a server to create a comprehensive way to secure a system.
artlas 140.728aea5 Apache Real Time Logs Analyzer System.
chkrootkit 0.53 Checks for rootkits on a system
detect-sniffer 151.63f0d7f Tool that detects sniffers in the network.
fastnetmon v1.1.4.r47.gffafe3a High performance DoS/DDoS load analyzer built on top of multiple packet capture engines.
fssb 73.51d2ac2 A low-level filesystem sandbox for Linux using syscall intercepts.
ifchk 1.1.1 A network interface promiscuous mode detection tool.
inetsim 1.3.1 A software suite for simulating common internet services in a lab environment, e.g. for analyzing the network behaviour of unknown malware samples.
jhead 3.03 EXIF JPEG info parser and thumbnail remover
lorg 98.aa4f1a3 Apache Logfile Security Analyzer.
malice 0.3.28 VirusTotal Wanna Be - Now with 100% more Hipster.
malmon 0.3 Hosting exploit/backdoor detection daemon.
maltrail 13222.cc0d587aa Malicious traffic detection system.
mat 0.6.1 Metadata Anonymisation Toolkit composed of a GUI application, a CLI application and a library.
mat2 0.9.0 A metadata removal tool, supporting a wide range of commonly used file formats.
nipe 231.5e6d77c A script to make Tor Network your default gateway.
osfooler-ng 2.c0b20d6 Prevents remote active/passive OS fingerprinting by tools like nmap or p0f.
portspoof 128.8b5596a This program's primary goal is to enhance OS security through a set of new techniques.
prowler 731.04acb74 Tool for AWS security assessment, auditing and hardening.
quicksand-lite 28.857210e Command line tool for scanning streams within office documents plus xor db attack.
sniffjoke 772.434bfb1 Injects packets in the transmission flow that are able to seriously disturb passive analysis like sniffing, interception and low level information theft.
snort A lightweight network intrusion detection system.
sooty 121.5ba7f55 The SOC Analysts all-in-one CLI tool to automate and speed up workflow.
suricata 4.1.4 An Open Source Next Generation Intrusion Detection and Prevention Engine.
tabi 13.068a406 BGP Hijack Detection.
tor-autocircuit 0.2 Tor Autocircuit was developed to give users a finer control over Tor circuit creation. The tool exposes the functionality of TorCtl library which allows its users to control circuit length, speed, geolocation, and other parameters.
tor-browser-en 8.5.5 Tor Browser Bundle: anonymous browsing using Firefox and Tor.
tor-router 4.001a510 A tool that allow you to make TOR your default gateway and send all internet connections under TOR (as transparent proxy) for increase privacy/anonymity without extra unnecessary code.
truecrypt 7.1a Free open-source cross-platform disk encryption software
tyton 1.2 Kernel-Mode Rootkit Hunter.
usb-canary 31.bb23552 A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unplugging devices it can be configured to send you an SMS or alert you via Slack or Pushover.
yeti 2071.35c4388c A platform meant to organize observables, indicators of compromise, TTPs, and knowledge on threats in a single, unified repository.
zeus 109.3197fd9 AWS Auditing & Hardening Tool.