Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 3.2.1.9 blackarch-crypto
- Group containing all types of cryptography related packages.
- Examples: ciphertest, xortool, sbd
- 3.2.1.10 blackarch-database
- Group containing the packages related to the operation of databases.
- Examples: metacoretex, blindsql
- 3.2.1.11 blackarch-debugger
- Group containing the packages allowing the user to investigate the internal functioning of a
- program when using it.
- Examples: radare2, shellnoob
- 3.2.1.12 blackarch-decompiler
- A group containing packages that attempt to perform reverse engineering on a compiled program.
- Examples: flasm, jd-mistletoe
- 3.2.1.13 blackarch-defensive
- Group containing the packets used to protect a system from software (malware) and used
- malicious agents.
- Examples: arpon, chkrootkit, sniffjoke
- 3.2.1.14 blackarch-disassembler
- This group is very similar to
- blackarch-decompiler
- in the sense that these two groups are trying
- to perform generic reverse engineering of executable files, but packages included in
- blackarch-disassembler
- will extract the assembler code and not a source code in the form of pseu-
- docode for example.
- Examples: inguma, radare2
- 3.2.1.15 blackarch-dos
- Group containing packages related to type attacks
- denial of service
- .
- Examples: 42zip, nkiller2
- 11
- 3.2.1.16 blackarch-drone
- Group containing packages helping with the maintenance and use of drones.
- Examples: meshdeck, skyjack
- 3.2.1.17 blackarch-exploitation
- Group containing the packages used when operating multiple programs and services.
- Examples: armitage, metasploit, zarp
- 3.2.1.18 blackarch-fingerprint
- Group containing packages used for recognition and impression purposes.
- Examples: dns-map, p0f, httprint
- 3.2.1.19 blackarch-firmware
- Group containing the packages used during firmware operation.
- Examples: None yet, amend asap.
- 3.2.1.20 blackarch-forensic
- Group containing the packages used in the computer investigation of the recovery
- potentially deleted data.
- Examples: aesfix, nfex, wyd
- 3.2.1.21 blackarch-fuzzer
- Group containing packages for fuzzing software.
- Examples: msf, mdk3, wfuzz
- 3.2.1.22 blackarch-hardware
- Group containing the packages related to the exploitation of physical material.
- Examples: arduino, smali
- 3.2.1.23 blackarch-honeypot
- Group containing packages acting as
- honeypots
- , that is, security services,
- but pretending to be vulnerable in order to observe his behavior.
- Examples: artillery, bluepot, wifi-honey
- 12
- The BlackArch Linux Guide
- 3.2.1.24 blackarch-keylogger
- Group containing packages used during installation of
- keylogging
- , the recording of
- keyboard keys on a system that could be used by a third-party user to extract
- confidential information.
- Examples: klogger, logkeys, xspy
- 3.2.1.25 blackarch-malware
- Group containing all types of packages with a link to
- malware
- , whether using these
- this or their detection.
- Examples: malwaredetect, peepdf, yara
- 3.2.1.26 blackarch-misc
- Group containing packages that do not seem to be part of any other categories.
- Examples: oh-my-zsh-git, winexe, stompy
- 3.2.1.27 blackarch-mobile
- Group containing packages related to maintenance activities and application audits, development
- application and mobile equipment.
- Examples: android-sdk-platform-tools, android-udev-rules
- 3.2.1.28 blackarch-networking
- Group containing the network related packets.
- Examples: Anything pretty much
- 3.2.1.29 blackarch-nfc
- Group containing packages using technology
- NFC
- (near-field communications).
- Examples: nfcutils
- 3.2.1.30 blackarch-packer
- Group containing packages related to
- packers
- , or software that creates applications
- embedding a malicious program.
- Examples: packerid
- 13
- The BlackArch Linux Guide
- 3.2.1.31 blackarch-proxy
- Group containing packages acting as a proxy, redirecting internet traffic to analyze it
- or modify it.
- Examples: burpsuite, ratproxy, sslnuke
- 3.2.1.32 blackarch-recon
- Group containing the packages used to search for exploitable services.
- Examples: canri, dnsrecon, netmask
- 3.2.1.33 blackarch-reversing
- Group containing packages of decompilation, disassembly, and all other types of
- grams related to reverse engineering.
- Examples: capstone, radare2, zerowine
- 3.2.1.34 blackarch-scanner
- Group containing the packages used to scan multiple systems for detecting
- active vulnerabilities.
- Examples: scanssh, tiger, zmap
- 3.2.1.35 blackarch-sniffer
- Groups containing packages assisting with network traffic analysis.
- Examples: hexinject, pytactle, xspy
- 3.2.1.36 blackarch-social
- Group containing packages related to attacks on social networking sites.
- Examples: jigsaw, websploit
- 3.2.1.37 blackarch-spoof
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement