Advertisement
Guest User

Untitled

a guest
Oct 23rd, 2017
73
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.53 KB | None | 0 0
  1.  
  2. 3.2.1.9 blackarch-crypto
  3. Group containing all types of cryptography related packages.
  4. Examples: ciphertest, xortool, sbd
  5. 3.2.1.10 blackarch-database
  6. Group containing the packages related to the operation of databases.
  7. Examples: metacoretex, blindsql
  8. 3.2.1.11 blackarch-debugger
  9. Group containing the packages allowing the user to investigate the internal functioning of a
  10. program when using it.
  11. Examples: radare2, shellnoob
  12. 3.2.1.12 blackarch-decompiler
  13. A group containing packages that attempt to perform reverse engineering on a compiled program.
  14. Examples: flasm, jd-mistletoe
  15. 3.2.1.13 blackarch-defensive
  16. Group containing the packets used to protect a system from software (malware) and used
  17. malicious agents.
  18. Examples: arpon, chkrootkit, sniffjoke
  19. 3.2.1.14 blackarch-disassembler
  20. This group is very similar to
  21. blackarch-decompiler
  22. in the sense that these two groups are trying
  23. to perform generic reverse engineering of executable files, but packages included in
  24. blackarch-disassembler
  25. will extract the assembler code and not a source code in the form of pseu-
  26. docode for example.
  27. Examples: inguma, radare2
  28. 3.2.1.15 blackarch-dos
  29. Group containing packages related to type attacks
  30. denial of service
  31. .
  32. Examples: 42zip, nkiller2
  33. 11
  34. 3.2.1.16 blackarch-drone
  35. Group containing packages helping with the maintenance and use of drones.
  36. Examples: meshdeck, skyjack
  37. 3.2.1.17 blackarch-exploitation
  38. Group containing the packages used when operating multiple programs and services.
  39. Examples: armitage, metasploit, zarp
  40. 3.2.1.18 blackarch-fingerprint
  41. Group containing packages used for recognition and impression purposes.
  42. Examples: dns-map, p0f, httprint
  43. 3.2.1.19 blackarch-firmware
  44. Group containing the packages used during firmware operation.
  45. Examples: None yet, amend asap.
  46. 3.2.1.20 blackarch-forensic
  47. Group containing the packages used in the computer investigation of the recovery
  48. potentially deleted data.
  49. Examples: aesfix, nfex, wyd
  50. 3.2.1.21 blackarch-fuzzer
  51. Group containing packages for fuzzing software.
  52. Examples: msf, mdk3, wfuzz
  53. 3.2.1.22 blackarch-hardware
  54. Group containing the packages related to the exploitation of physical material.
  55. Examples: arduino, smali
  56. 3.2.1.23 blackarch-honeypot
  57. Group containing packages acting as
  58. honeypots
  59. , that is, security services,
  60. but pretending to be vulnerable in order to observe his behavior.
  61. Examples: artillery, bluepot, wifi-honey
  62. 12
  63. The BlackArch Linux Guide
  64. 3.2.1.24 blackarch-keylogger
  65. Group containing packages used during installation of
  66. keylogging
  67. , the recording of
  68. keyboard keys on a system that could be used by a third-party user to extract
  69. confidential information.
  70. Examples: klogger, logkeys, xspy
  71. 3.2.1.25 blackarch-malware
  72. Group containing all types of packages with a link to
  73. malware
  74. , whether using these
  75. this or their detection.
  76. Examples: malwaredetect, peepdf, yara
  77. 3.2.1.26 blackarch-misc
  78. Group containing packages that do not seem to be part of any other categories.
  79. Examples: oh-my-zsh-git, winexe, stompy
  80. 3.2.1.27 blackarch-mobile
  81. Group containing packages related to maintenance activities and application audits, development
  82. application and mobile equipment.
  83. Examples: android-sdk-platform-tools, android-udev-rules
  84. 3.2.1.28 blackarch-networking
  85. Group containing the network related packets.
  86. Examples: Anything pretty much
  87. 3.2.1.29 blackarch-nfc
  88. Group containing packages using technology
  89. NFC
  90. (near-field communications).
  91. Examples: nfcutils
  92. 3.2.1.30 blackarch-packer
  93. Group containing packages related to
  94. packers
  95. , or software that creates applications
  96. embedding a malicious program.
  97. Examples: packerid
  98. 13
  99. The BlackArch Linux Guide
  100. 3.2.1.31 blackarch-proxy
  101. Group containing packages acting as a proxy, redirecting internet traffic to analyze it
  102. or modify it.
  103. Examples: burpsuite, ratproxy, sslnuke
  104. 3.2.1.32 blackarch-recon
  105. Group containing the packages used to search for exploitable services.
  106. Examples: canri, dnsrecon, netmask
  107. 3.2.1.33 blackarch-reversing
  108. Group containing packages of decompilation, disassembly, and all other types of
  109. grams related to reverse engineering.
  110. Examples: capstone, radare2, zerowine
  111. 3.2.1.34 blackarch-scanner
  112. Group containing the packages used to scan multiple systems for detecting
  113. active vulnerabilities.
  114. Examples: scanssh, tiger, zmap
  115. 3.2.1.35 blackarch-sniffer
  116. Groups containing packages assisting with network traffic analysis.
  117. Examples: hexinject, pytactle, xspy
  118. 3.2.1.36 blackarch-social
  119. Group containing packages related to attacks on social networking sites.
  120. Examples: jigsaw, websploit
  121. 3.2.1.37 blackarch-spoof
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement