meta-kali
This layer will follow the kali linux tool list to help test the security of OE / Yocto based code.
Git repository
https://github.com/akuster/meta-kali web repo
Last commit: 7 years, 7 months ago (master branch)
Dependencies
The meta-kali layer depends upon:
Recipe name | Version | Description |
---|---|---|
axel | 2.5 | Light download accelerator - console version |
bed | 0.5+gitX | A network protocol fuzzer |
braa | 0.82 | Braa is a mass snmp scanner. |
capstone | 3.0.3 | Capstone is a lightweight multi-platform, multi-architecture disassembly framework. |
chkrootkit | 0.51 | locally checks for signs of a rootkit |
core-image-kali | 1.0 | A small image with Security testing packages |
core-image-kali-forensic | 1.0 | A Kali image with Forensic packages |
core-image-kali-full | 1.0 | A Kali image that contains all packages |
core-image-kali-testing | 1.0 | A Kali image with testing packages |
crunch | 3.6 | crunch - wordlist generator |
dhcpig | 1.0 | DHCPig initiates an advanced DHCP exhaustion attack. It will consume all IPs on the LAN, stop new users from obtaining IPs, release any IPs in use, then for good measure send gratuitous ARP and knock |
discover | 1.0 | For use with Kali Linux. Custom bash scripts used to automate various pentesting tasks. |
dnsmap | 0.30+gitX | Passive DNS network mapper a.k.a. subdomains bruteforcer |
dnsrecon | 0.8.9 | A Powerfule DNS enumeration script |
funkload | 1.17.1 | Functional and load web tester. |
goofile | 1.5 | Command line filetype search |
iaxflood | 1.0 | A UDP Inter-Asterisk_eXchange (i.e. IAX) packet was captured from an IAX channel between two Asterisk IP PBX’s. The content of that packet is the source of the payload for the attack embodied by this |
inundator | 0.5 | inundator is a tool used to anonymously inundate intrusion detection logs with false positives to obfuscate a real attack, leaving the IDS analyst feeling completely inundated. |
ipv6toolkit | 2.0 | The SI6 Networks' IPv6 toolkit is a set of IPv6 security assessment and trouble-shooting tools. It can be leveraged to perform security assessments of IPv6 networks, assess the resiliency of IPv6 devi |
john | 1.8.0 | John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3 |
lynis | 2.1.0 | Lynis is a security auditing tool for Unix and Linux based systems. It performs in-depth security scans, with almost no configuration. |
mdk3 | 1.0 | Wireless attack tool for IEEE 802.11 networks |
memdump | 1.01 | Program which dumps system memory to the standard output stream, skipping over holes in memory maps. By default, the program dumps the contents of physical memory. |
ncrack | 0.4 | Ncrack is a high-speed network authentication cracking too. |
p0f | 3.08b | Passive OS fingerprinting tool |
p0f-tools | 3.08b | Passive OS fingerprinting tool |
packagegroup-kali-base | 1.0 | Security packagegroup for Poky |
packagegroup-kali-forensic | 1.0 | Kali forensic group |
packagegroup-kali-passwd | 1.0 | Kali PassWord group |
packagegroup-kali-scan | 1.0 | Kali Scanner group |
packagegroup-kali-testing | 1.0 | Kali Stress test group |
packagegroup-kali-wireless | 1.0 | Kali wireless packages |
pwgen | 2.07 | Pwgen is a small, GPL'ed password generator which creates passwords which can be easily memorized by a human. |
python-automator | 0.21+gitX | A IP and URL analysis tool |
python-capstone | 3.0.3 | Capstone disassembly engine |
python-dnspython | 1.12.0 | |
python-netaddr | 0.7.14 | A library for network address representation and manipulation |
python-nmap | 0.6.0 | python-nmap is a python library which helps in using nmap port scanner. It allows to easilly manipulate nmap scan results and will be a perfect tool for systems administrators who want to automatize s |
python-pefile | 1.2.10 | Portable Executable reader module |
reaver | 1.0 | Reaver implements a brute force attack against Wifi Protected Setup |
rtpflood | 1.0 | A command line tool used to flood any device that is processing RTP. |
slowhttptest | 1.6 | SlowHTTPTest is a highly configurable tool that simulates some Application Layer Denial of Service attacks. |
t50 | 5.6.7 | Very fast network stress tool |
tcpflow | 1.4.5 | TCP/IP packet demultiplexer |
testdisk | 6.14 | TestDisk is powerful free data recovery software! |
thc-ipv6 | 2.7 | THC-IPV6-ATTACK-TOOLKIT |
thc-ssl-dos | 1.4 | Establishing a secure SSL connection requires 15x more processing power on the server than on the client.THC-SSL-DOS exploits this asymmetric property by overloading the server and knocking it off the |
the-backdoor-factory | 3.0.3 | Patch PE, ELF, Mach-O binaries with shellcode |
theharvester | 2.6 | theHarvester is a tool for gathering e-mail accounts, subdomain names, virtual hosts, open ports/ banners, and employee names from different public sources (search engines, pgp key servers). |
volatility | 2.4 | The Volatility Framework is open source and written in Python |
xdotool | 20150503 | fake keyboard/mouse input, window management, and more |