Ycarus Gentoo ebuild

pentoo

These ebuilds come from .

If you have some problems, go to the official site first.

net-analyzer

GyoiThon : GyoiThon is a growing penetration test tool using Machine Learning ( https://github.com/gyoisamurai/GyoiThon )

amass : Subdomain OSINT Enumeration ( https://github.com/OWASP/Amass )

aquatone : A Tool for Domain Flyovers ( https://github.com/michenriksen/aquatone https://michenriksen.com/blog/aquatone-now-in-go/ )

arachni-bin : Web Application Security Scanner Framework ( https://www.arachni-scanner.com https://github.com/Arachni/arachni )

armitage : Cyber Attack Management for Metasploit ( http://www.fastandeasyhacking.com/ )

armitage-bin : Cyber Attack Management for Metasploit ( http://www.fastandeasyhacking.com/ )

arpantispoofer : An utility to detect and resist arp spoofing ( http://sourceforge.net/projects/arpantispoofer/ )

autoscan-network : Utility for network exploration with Samba support. ( http://autoscan-network.com/ )

bettercap : A complete, modular, portable and easily extensible MITM framework ( https://github.com/bettercap/bettercap/ )

blindelephant : generic web application fingerprinter that produces results by examining a small set of static files ( http://blindelephant.sourceforge.net/ )

bonesi : BoNeSi - the DDoS botnet simulator ( https://github.com/Markus-Go/bonesi )

cameradar : Cameradar hacks its way into RTSP videosurveillance cameras ( https://github.com/ullaakut/cameradar )

capanalysis : A web visual tool for information security specialists ( https://www.capanalysis.net https://github.com/xplico/CapAnalysis )

cipherscan : A very simple way to find out which SSL ciphersuites are supported by a target. ( https://github.com/mozilla/cipherscan )

cisco-auditing-tool : Perl script which scans cisco routers for common vulnerabilities. ( http://www.scrypt.net/~g0ne )

cisco-bruteforce-enabler : cisco internal bruteforcer ( http://packetstormsecurity.org/cisco/enabler.c )

cisco-scanner : scan a network for cisco routers with default passwords ( http://packetstormsecurity.org/cisco/ciscos.c )

cisco-torch : Cisco mass scanning, fingerprinting, and exploitation tool ( http://www.arhont.com/en/category/resources/tools-utilities/ )

commix : Automated All-in-One OS command injection and exploitation tool ( https://github.com/commixproject/commix )

cottontail : Capture all RabbitMQ messages being sent through a broker ( https://github.com/QKaiser/cottontail )

crackmapexec : A swiss army knife for pentesting Windows/Active Directory environments ( https://github.com/byt3bl33d3r/CrackMapExec/releases )

davtest : tests WebDAV enabled servers ( https://github.com/cldrn/davtest )

dirb : A Web Content Scanner to look for existing/hidden content ( http://dirb.sourceforge.net/ )

dirble-bin : Fast directory scanning and scraping tool ( https://github.com/nccgroup/dirble )

dirhunt : Dirhunt is a web crawler optimized for searching and analyzing web directories. ( https://github.com/Nekmo/dirhunt )

dirsearch : A simple command line tool designed to brute force dirs and files in websites ( https://github.com/maurosoria/dirsearch )

dnsa : Swiss-army knife tool for dns auditing ( http://packetfactory.openwall.net/projects/dnsa/index.html )

dnsrecon : DNS Enumeration Script ( https://github.com/darkoperator/dnsrecon )

dripcap-bin : Caffeinated Modern Packet Analyzer ( https://dripcap.org https://github.com/dripcap/dripcap )

droopescan : A scanner that helps identifying issues in Drupal, SilverStripe, and Wordpress ( https://github.com/droope/droopescan )

dsniff : A collection of tools for network auditing and penetration testing ( https://monkey.org/~dugsong/dsniff/ )

enteletaor : Message Queue and Broker Injection tool ( https://github.com/cr0hn/enteletaor )

enum4linux : a tool for enumerating information from Windows and Samba systems ( http://labs.portcullis.co.uk/application/enum4linux/ )

evilgrade : A modular framework that takes advantage of poor upgrade implementations by injecting fake updates. ( http://www.infobytesec.com/developments.html )

ffuf : Fast web fuzzer written in Go ( https://github.com/ffuf/ffuf )

fierce : A DNS reconnaissance tool for locating non-contiguous IP space ( https://github.com/mschwager/fierce )

findomain : The fastest and cross-platform subdomain enumerator, don't waste your time ( https://github.com/Edu4rdSHL/findomain )

geoedge : This little tools is designed to get geolocalization information of a host ( http://www.edge-security.com/edge-soft.php )

geoipgen : Generate a list of hostnames based on country ( http://www.morningstarsecurity.com/research/geoipgen )

gitrob : Reconnaissance tool for GitHub organizations ( https://github.com/michenriksen/gitrob https://michenriksen.com/blog/gitrob-now-in-go/ )

go-webanalyze : Port of Wappalyzer (uncovers technologies used on websites) in Go to automate scanning ( https://github.com/rverton/webanalyze )

gobuster : A tool to brute-force URIs and DNS subdomains ( https://github.com/OJ/gobuster )

greenbone-security-assistant : Greenbone Security Assistant ( https://www.greenbone.net/en/ )

gvm : Greenbone Vulnerability Management,previously named OpenVAS ( https://www.greenbone.net/en/ )

gvm-libs : Greenbone vulnerability management libraries, previously named openvas-libraries ( https://www.greenbone.net/en/ )

gvm-tools : Remote control for Greenbone Vulnerability Manager, previously named openvas-cli ( https://www.greenbone.net/en/ )

gvmd : Greenbone vulnerability manager, previously named openvas-manager ( https://www.greenbone.net/en/ )

ham2mon : A GNU Radio (GR) based SDR scanner with a Curses interface. ( https://github.com/madengr/ham2mon )

httprint : HTTP fingerprinter tool ( http://net-square.com/httprint.html )

hyenae : a highly flexible packet generator ( http://sourceforge.net/projects/hyenae/ )

ifchk : A network interface promiscuous mode detection tool ( https://www.noorg.org/ifchk/ )

ike-scan : A utility for finding, fingerprinting and testing IKE VPN servers ( http://www.nta-monitor.com/wiki/index.php/Ike-scan_Documentation )

iposint : Discovery IP Address of the target ( https://github.com/j3ssie/IPOsint )

jmsdigger-bin : JMSDigger is an Enterprise Messaging Application assessment tool focuses on ActiveMQ ( https://github.com/OpenSecurityResearch/jmsdigger )

maketh : Ethernet packet injector and creator ( http://simpp-kode.tuxfamily.org/maketh/index.html )

masscan : Mass IP port scanner ( https://github.com/robertdavidgraham/masscan )

massdns : A high-performance DNS stub resolver for bulk lookups and reconnaissance ( https://github.com/blechschmidt/massdns )

medusa : A modular, parallel, multiprotocol, network login auditor ( http://foofus.net/goons/jmk/medusa/medusa.html )

metabigor : Command line Search Engines Framework but without API key ( https://github.com/j3ssie/Metabigor )

metagoofil : Information gathering tool designed for extracting metadata of public documents ( http://www.edge-security.com/metagoofil.php )

mosref : A secure remote execution framework using a compact Scheme-influenced VM ( http://sourceforge.net/projects/mosref/ )

nacker : Bypass NAC by hijacking non-802.1x configurable hosts ( https://github.com/carmaa/nacker )

nbtool : Some tools for NetBIOS and DNS investigation, attacks, and communication ( http://www.skullsecurity.org/wiki/index.php/Nbtool )

nikto : Web server vulnerability scanner ( http://www.cirt.net/Nikto2 )

nmap-vulners : NSE script based on Vulners.com API ( https://github.com/vulnersCom/nmap-vulners )

nmap_vulscan : A NSE vulnerability scanner which uses an offline version of scip VulDB ( http://www.computec.ch/projekte/vulscan/ )

ntp-fingerprint : NTP fingerprinting utility ( http://www.arhont.com/en/category/resources/tools-utilities/ )

onesixtyone : An efficient SNMP scanner ( http://labs.portcullis.co.uk/application/onesixtyone/ http://www.phreedom.org/software/onesixtyone/ )

openvas-scanner : Open Vulnerability Assessment Scanner ( https://www.greenbone.net/en/ )

osmedeus : A offensive security tool for reconnaissance and vulnerability scanning ( https://github.com/j3ssie/Osmedeus )

ospd : Base class for scanner wrappers,communication protocol for GVM ( https://www.greenbone.net/en/ )

owtf : The Offensive Web Testing Framework ( https://github.com/owtf/owtf )

padbuster : Automated script for performing Padding Oracle attacks ( http://gdssecurity.com )

plecost : Wordpress finger printing tool, retrieve information about the plugins and versions installed ( http://www.iniqua.com/labs/plecost/ )

polenum : Extract password policy from a windows machine ( https://github.com/Wh1t3Fox/polenum )

ppscan : Port scanner with HTTP and FTP tunneling support ( https://packetstormsecurity.com/files/82897/PPScan-Portscanner-0.3.html )

pret : Printer Exploitation Toolkit ( https://github.com/RUB-NDS/PRET )

rdp-sec-check : Remote Desktop Protocol security settings checker ( https://github.com/portcullislabs/rdp-sec-check )

recon-ng : Web Reconnaissance Framework ( https://github.com/lanmaster53/recon-ng )

responder : LLMNR, NBT-NS and MDNS poisoner, HTTP/SMB/MSSQL/FTP/LDAP rogue authentication ( https://github.com/lgandx/Responder )

rpcapd : Remote packet capture daemon ( https://www.winpcap.org/devel.htm )

ruler : A tool to abuse Exchange services ( https://github.com/sensepost/ruler )

scamper : Actively probes the Internet in order to analyze topology and performance ( http://www.caida.org/tools/measurement/scamper/ )

serialusb : A cheap USB proxy for input devices ( https://github.com/matlo/serialusb )

sessionlist : A HTTP packets sniffer ( https://github.com/iamrage/sessionlist )

set : A social engineering framework ( https://www.trustedsec.com/downloads/social-engineer-toolkit/ )

sipvicious : A voip pentest tools suite ( http://code.google.com/p/sipvicious/ )

sitadel : Web application security scanner ( https://github.com/shenril/Sitadel )

smbmap : SMBMap is a handy SMB enumeration tool. ( https://github.com/ShawnDEvans/smbmap )

snmpenum : A perl script to enumerate SNMP table dumper ( http://packetstormsecurity.org )

sqlninja : A SQL Server injection and takeover tool ( http://sqlninja.sourceforge.net/ )

sslstrip : sslstrip remove https and forwards http ( http://www.thoughtcrime.org/software/sslstrip/ )

sslyze : Fast and full-featured SSL scanner ( https://github.com/nabla-c0d3/sslyze )

subdomainer : This script will search in Google, Msn.search and Yahoo for subdomains related to the target domain ( http://www.edge-security.com/subdomainer.php )

subfinder : subdomain discovery tool that discovers valid subdomains for websites ( https://github.com/subfinder/subfinder )

subjack : Subdomain Takeover tool written in Go ( https://github.com/haccer/subjack )

sublert : Monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate ( https://github.com/yassineaboukir/sublert )

sublist3r : Enumerate subdomains of websites using OSINT ( https://github.com/aboul3la/Sublist3r )

termshark : A terminal UI for tshark, inspired by Wireshark ( https://termshark.io/ https://github.com/gcla/termshark )

testssl : Tool to check TLS/SSL cipher support ( https://testssl.sh/ )

thc-pptp-bruter : a brute force program that works against pptp vpn endpoints ( http://www.thc.org )

thc-ssl-dos : THC-SSL-DOS is a tool to verify the performance of SSL servers ( https://github.com/vanhauser-thc )

theHarvester : The Harvester is a tool designed to collect email accounts of the target domain ( http://www.edge-security.com/theharvester.php )

tplmap : Server-Side Template Injection and code injection tool ( https://github.com/epinna/tplmap )

ucsniff : VoIP audio and video sniffer ( http://ucsniff.sourceforge.net )

unicornscan : A utility for information gathering or security auditing ( http://www.unicornscan.org )

upnpwn : UPNP pentesting tool and library ( http://bigbrainlabs.blogspot.com/ )

videojak : VideoJak is an IP Video security assessment tool ( http://videojak.sourceforge.net/ )

voiphopper : VoIP Hopper is a tool that rapidly runs a VLAN Hop into the Voice VLAN ( http://voiphopper.sourceforge.net/ )

vomit : Converts a Cisco IP phone conversation into a wav file" ( http://vomit.xtdnet.nl/ )

w3af : Web Application Attack and Audit Framework ( http://w3af.sourceforge.net/ )

wafw00f : Identifies and fingerprints Web Application Firewall (WAF) products ( https://github.com/sandrogauci/wafw00f )

webshag : An enhanced HTTP URL Scanner and fuzzer ( https://www.scrt.ch/en/attack/downloads/webshag )

wfuzz : Wfuzz is a tool designed for bruteforcing Web Applications ( http://www.edge-security.com/wfuzz.php )

whatweb : Next generation web scanner, identifies what software websites are running ( http://www.morningstarsecurity.com/research/whatweb )

wpscan : Wordpress security scanner ( http://wpscan.org/ )

xbruteforcer : Login brute force tool for WordPress, Joomla, DruPal, OpenCart, and Magento. ( https://github.com/Moham3dRiahi/XBruteForcer )

xplico : Extract data from TCP/IP traffic ( http://www.xplico.org )

xsstrike : Advanced XSS detection suite ( https://github.com/s0md3v/XSStrike )

zarp : Local network attack toolkit ( https://github.com/hatRiot/zarp )

Add an ebuild in portage :

The ebuild is now in the portage tree.

You can also use layman : emerge layman then layman -a pentoo

For Paludis use this rsync : rsync://gentoo.zugaina.org/pentoo-portage

If you have a problem : ycarus(-at-)zugaina.org