Differences

This shows you the differences between two versions of the page.

Link to this comparison view

tools [2013/04/01 15:46]
coreycb
tools [2026/03/13 15:09] (current)
twiggy
Line 11: Line 11:
 Compiler with static analysis capabilities for C/C++. Compiler with static analysis capabilities for C/C++.
  
-Clang and very recent GCC also have dynamic "​sanitizers":​+[[http://​clang-analyzer.llvm.org/​]] 
 + 
 +[[http://​clang.llvm.org/​]] 
 + 
 +Clang and very recent GCC also have dynamic "​sanitizers"​.  For example:
  
 [[http://​clang.llvm.org/​docs/​AddressSanitizer.html]] [[http://​clang.llvm.org/​docs/​AddressSanitizer.html]]
Line 22: Line 26:
 A tool for matching and fixing source code for C, C++, and other languages. A tool for matching and fixing source code for C, C++, and other languages.
  
-[[http://​coccinelle.lip6.fr/]]+[[https://​coccinelle.gitlabpages.inria.fr/website/]]
  
 ==== Coverity ==== ==== Coverity ====
 Provides static analysis tools for C, C++, and other languages (requires license). Provides static analysis tools for C, C++, and other languages (requires license).
  
-[[http://​www.coverity.com/​]]+[[https://www.synopsys.com/​software-integrity.html]] 
 + 
 +Free scanning for open source C/C++ and Java projects (no license required):​ 
 + 
 +[[https://​scan.coverity.com/​]]
  
 ==== cppcheck ==== ==== cppcheck ====
Line 52: Line 60:
 The gcc compiler has extensive warning flags that can, among other things, find possible security vulnerabilities by locating variables that are used before being set, dangerous printf formats, mismatches between printf formats and arguments, and so forth. ​ For example, you can use: The gcc compiler has extensive warning flags that can, among other things, find possible security vulnerabilities by locating variables that are used before being set, dangerous printf formats, mismatches between printf formats and arguments, and so forth. ​ For example, you can use:
  
-WARNINGS = -g -O -D_FORTIFY_SOURCE=2 -Wall -Wextra -Wendif-labels -Wformat=2 -Winit-self -Wswitch-enum -Wdeclaration-after-statement -Wshadow -Wpointer-arith -Wbad-function-cast -Wcast-align -Wwrite-strings -Wjump-misses-init -Wlogical-op -Wstrict-prototypes -Wmissing-prototypes -Wredundant-decls -Wnested-externs -Werror+WARNINGS = -g -O -D_FORTIFY_SOURCE=2 -Wall -Wextra -Wendif-labels -Wformat=2 -Winit-self -Wswitch-enum -Wdeclaration-after-statement -Wshadow -Wpointer-arith -Wbad-function-cast -Wcast-align -Wwrite-strings -Wjump-misses-init -Wlogical-op -Wstrict-prototypes -Wmissing-prototypes -Wredundant-decls -Wnested-externs ​-Wundef -Wformat-security ​-Werror
  
 with GCC (4.6 or later). ​ Many of those are not security-related,​ of course, but -Wformat=2 certainly is, and some of the -Wall and -Wextra warnings are as well. with GCC (4.6 or later). ​ Many of those are not security-related,​ of course, but -Wformat=2 certainly is, and some of the -Wall and -Wextra warnings are as well.
  
 [[http://​gcc.gnu.org/​onlinedocs/​gcc/​Warning-Options.html]] [[http://​gcc.gnu.org/​onlinedocs/​gcc/​Warning-Options.html]]
- 
 ==== JLint ==== ==== JLint ====
 A static analysis tool to find race conditions, locking errors, null pointer uses,  A static analysis tool to find race conditions, locking errors, null pointer uses, 
Line 79: Line 86:
  
 [[http://​www.debian.org/​security/​audit/​examples/​pscan]] [[http://​www.debian.org/​security/​audit/​examples/​pscan]]
 +
 +==== Pylint ====
 +Pylint is a Python static analysis tool.
 +
 +[[http://​www.pylint.org/​]]
  
 ==== RATS ==== ==== RATS ====
Line 127: Line 139:
  
 ===== System Security Checking ===== ===== System Security Checking =====
 +
 +==== exec-notify ====
 +exec-notify globally shows which programs are executed on a system. This allows to
 +track down shell escaping problems in larger applications which execute external programs
 +every now and then or in bootup scripts.
 +
 +[[http://​www.suse.de/​~krahmer/​exec-notify.c]]
 +
 +==== Fsnoop ====
 +
 +Fsnoop is a tool to monitor file operations on GNU/Linux systems. Its primary purpose is to detect bad temporary file usages and therefore, file race condition vulnerabilities.
 +
 +[[http://​vladz.devzero.fr/​fsnoop.php]]
 +
 +==== inotify ====
 +inotify can observe directories like /tmp for changes, e.g. insecure creation
 +of files etc.
 +
 +[[http://​www.suse.de/​~krahmer/​inotify.cc]]
 +
 +==== lsof ====
 +List open files - "​lsof"​ - is a tool to gather information about
 +processes'​ open file descriptors (not only files itself). This information includes
 +the name and PID of the process, the type of file and so on. Many Linux and BSD distributions
 +ship lsof.
 +
 +[[ftp://​lsof.itap.purdue.edu/​pub/​tools/​unix/​lsof/​]]
  
 ==== openscap ==== ==== openscap ====
Line 137: Line 176:
  
 [[http://​code.google.com/​p/​unix-privesc-check]] [[http://​code.google.com/​p/​unix-privesc-check]]
 +
  
 ===== Penetration Testing ​ ===== ===== Penetration Testing ​ =====
Line 152: Line 192:
  
 ===== Fuzz Testing ===== ===== Fuzz Testing =====
- 
-==== Trinity ==== 
-A Linux System call fuzz tester. 
- 
-[[http://​codemonkey.org.uk/​projects/​trinity/​]] 
  
 ==== fsfuzzer ==== ==== fsfuzzer ====
Line 168: Line 203:
  
 [[http://​peachfuzzer.com/​]] [[http://​peachfuzzer.com/​]]
 +
 +==== Trinity ====
 +A Linux System call fuzz tester.
 +
 +[[http://​codemonkey.org.uk/​projects/​trinity/​]]
 +
  
 ===== Source Code Navigation ===== ===== Source Code Navigation =====
Line 241: Line 282:
 [[http://​sourceware.org/​insight/​]] [[http://​sourceware.org/​insight/​]]
  
-===== Others ​=====+===== Vulnerability Management ​=====
  
-==== exec-notify ​==== +==== Faraday ​==== 
-exec-notify globally shows which programs are executed ​on a systemThis allows ​to +With [[https://​github.com/​infobyte/​faraday|Faraday]] you may focus on discovering vulnerabilities while we help you with the restJust use it in your terminal and get your work organized on the run. Faraday was made to let you take advantage of the available tools in the community in a truly multiuser way. 
-track down shell escaping problems ​in larger applications which execute external programs +Faraday aggregates ​and normalyzses the data you load, allowing exploring it into different visualizations that are useful to managers and analyst alike.
-every now and then or in bootup scripts.+
  
-[[http://​www.suse.de/​~krahmer/​exec-notify.c]] +===== Others ​=====
- +
-==== inotify ​==== +
-inotify can observe directories like /tmp for changes, e.g. insecure creation +
-of files etc. +
- +
-[[http://​www.suse.de/​~krahmer/​inotify.cc]] +
- +
-==== lsof ==== +
-List open files - "​lsof"​ - is a tool to gather information about +
-processes'​ open file descriptors (not only files itself). This information includes +
-the name and PID of the process, the type of file and so on. Many Linux and BSD distributions +
-ship lsof. +
- +
-[[ftp://​lsof.itap.purdue.edu/​pub/​tools/​unix/​lsof/​]]+
  
 ==== symboldb ==== ==== symboldb ====
Line 273: Line 299:
  
 [[https://​victims-websec.rhcloud.com/​]] [[https://​victims-websec.rhcloud.com/​]]
- 
- 
  
  
tools.txt · Last modified: 2026/03/13 15:09 by twiggy
 
Except where otherwise noted, content on this wiki is licensed under the following license: CC Attribution-Noncommercial-Share Alike 3.0 Unported
Recent changes RSS feed Donate to DokuWiki Powered by PHP Valid XHTML 1.0 Valid CSS Driven by DokuWiki Powered by OpenVZ Powered by Openwall GNU/*/Linux