The creator of this program, Alexei Bulazel, graduated from Rensselaer Polytechnic Institute of New York. He developed Anti-Virus Leak to allow security analysts to extract a number of files, MAC addresses and types of processes. Anti-Virus Leak – or AV Leak – also allows users to scan for fingerprints without the hassle of manually using binary reverse engineering.
AV Leak works with AVG Anti-Virus, Kaspersky, BitDefender, VBA32 and many more anti-virus softwares.
Dradis[caption id="attachment_39571" align="aligncenter" width="1024"] Image Source: Google Image – A still from YouTube showing Dradis in action.[/caption]
Dradis, an open source program, was created by Daniel Martin. The software allows hackers to share their findings – such as flaws and vulnerabilities – with other security experts on a web-based interface that gives them a library of data. From this interface, they can keep track of what attacks and vulnerabilities they have discovered, and even informs them as to what steps can be taken for further results.
Swizzler[caption id="attachment_39572" align="aligncenter" width="1200"] Image Source: Google Image – Vincent Tan from Vantage Point demonstrating his version of developed Swizzler at work at Black Hat 2016.[/caption]
Swizzler was a framework long forgotten because of its instability, and its issues working with cell phones and platforms. Thanks to Vincent Tan, a senior security consultant at Vantage Point, Swizzler was taken under his wing and made better for mobile application assessment programs.
Snoopy[caption id="" align="aligncenter" width="590"] Image Source: Google Image – A screenshot showing Snoopy terminal working on Kali Linux.[/caption]
Remember in Batman, when Bruce Wayne goes into Lex Luther’s server room and connects a device to download data from Lex’s the servers? Well, Snoopy is something similar, without the need to connect it. This program can be installed on RaspberryPi, or any other similar device, to collect information from people’s cellphones using their wireless signals (only Bluetooth and WiFi).
Since the software is not specific to the smartphone’s platform, it uses the protocol in both these wireless systems, giving it a vast data collecting technique.
It also allows users to create a profile of the target depending on the connected devices. The program has been studied by security specialists working at security consultancy, Sensepost. As this program does not limit the user’s imagination, it can be used as a rogue access point, allowing the hacker to collect traffic, as well as tap it.