WarBerryPi alternatives
Looking for an alternative tool to replace WarBerryPi? During the review of WarBerryPi we looked at other open source tools. Based on their category, tags, and text, these are the ones that have the best match.
Alternatives (by score)
Chiron
Introduction
Chiron is a security assessment framework for IPv6. It provides several modules including an IPv6 scanner, IPv6 Local Link, IPv4-to-IPv6 proxy, IPv6 attack module, and IPv6 proxy. These modules help to perform an assessment, like a penetration test.
The tool uses IPv6 extension headers to create a headers chain. This may allow evading security devices like IDS, IPS, and firewalls. Due to the flexibility of the framework, the tool can also be used to perform fuzzing of the IPv6 stack of a device.
Project details
Chiron is written in Python.
Strengths and weaknesses
- + The source code of this software is available
- - No releases on GitHub available
Typical usage
- Network analysis
- Network scanning
- Network security monitoring
Btlejack
Introduction
Btlejack is a security tool that provides all options to sniff, jam, and hijack Bluetooth Low Energy (BLE) devices. It can be used during security assessments to test the security of devices that use Bluetooth as a communication protocol.
Project details
Btlejack is written in Python.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Bluetooth security testing
- Connection hijacking
- Security assessment
btfind (Bluetooth Finder)
Introduction
This tool lacks documentation, so the review is limited at this moment.
Project details
btfind is written in Python.
Strengths and weaknesses
- + The source code of this software is available
- - Minimal or no documentation available
Typical usage
- Asset discovery
- Network scanning
BTLE-Sniffer (btlesniffer)
Introduction
BTLE-Sniffer is a scanning tool that scans Bluetooth Low Energy (BLE) devices and tries to identify them. Read how it works in this tool review.Project details
0trace.py
Introduction
This security tool enables the user to perform hop enumeration (similar to traceroute). Instead of sending actual packets, it uses an established TCP connection.
Project details
0trace.py is written in Python.
Strengths and weaknesses
- + Project is mature (10+ years)
- - Unknown project license
Typical usage
- Bypassing firewall rules
- Bypassing security measures
- Reconnaissance
IVRE
Introduction
IVRE is a framework to perform reconnaissance for network traffic. It leverages other tools to pull in the data and show it in the web interface.Project details
IVRE is written in Python.
Strengths and weaknesses
- + More than 10 contributors
- + More than 1000 GitHub stars
- + The source code of this software is available
Typical usage
- Digital forensics
- Information gathering
- Intrusion detection
- Network analysis
Wireshark
Introduction
Wireshark is a mature project with many users all over the world. Its library is stable and can be used by both graphical as text-based interfaces. With many books and even conferences around the subject, this tool is a safe bet to have in your toolbox.
Project details
Wireshark is written in C.
Strengths and weaknesses
- + The source code of this software is available
- + Well-known tool
Typical usage
- Network analysis
- Network traffic analysis
- Security assessment
- Troubleshooting
Expliot
Introduction
Expliot is a framework to perform security testing and exploitation of IoT infrastructure and IoT devices. It comes with a set of tests in the form of plugins. The framework can be extended by creating custom plugins. As you may expect from a tool like Expliot, the typical communication protocols and message buses are supported. Examples include CANBus, BLE, MQTT, CoAP. In other words, enough acronyms for those familiar with the technology.
Project details
Expliot is written in Python.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Hardware security
- IoT security testing
- Security assessment
Termineter
Introduction
Termineter is a framework written in Python to assist with testing the security of smart meters. It can be used during development or afterward to test supported devices.
Project details
Termineter is written in Python.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Hardware security
Domain Analyzer
Introduction
Domain Analyzer is an information gathering tool and comes in handy for reconnaissance. This can be useful for doing penetration testing or evaluating what information is publically available about your own domains. Some pieces of information that can be discovered include DNS servers, IP addresses, mail servers, SPF information, open ports, and more.
Project details
Domain Analyzer is written in Python.
Strengths and weaknesses
- + More than 1000 GitHub stars
- + Very low number of dependencies
- + The source code of this software is available
Typical usage
- Information gathering
- Penetration testing
Wappalyzer
Introduction
Wappalyzer can be a useful asset when performing reconnaissance on a particular target like a web application or website. It helps to find what software is used to run a particular page. Components that can be detected are the content management system (CMS), JavaScript framework, e-commerce software, web server, and more.
Project details
Wappalyzer is written in Node.js.
Strengths and weaknesses
- + Has 300+ contributors
- + More than 4000 GitHub stars
- + Many releases available
- + The source code of this software is available
Typical usage
- Information gathering
- Reconnaissance
- Software identification
APT2 (apt2)
Introduction
APT2 stands for Automated Penetration Testing Toolkit.
APT2 performs a scan with Nmap or can import the results of a scan from Nexpose or Nessus. The processed results will be used in the second phase. This phase launches exploit and enumeration modules. It helps pentesters to automate assessments and tasks.
Suggested components to have installed: convert, dirb, hydra, java, john, ldapsearch, msfconsole, nmap, nmblookup, phantomjs, responder, rpcclient, secretsdump.py, smbclient, snmpwalk, sslscan, xwd
Project details
APT2 is written in Python.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Penetration testing
- Security assessment
BeEF
Introduction
BeEF is used by penetration testers to assess the security of a system by leveraging the web browser. This makes the tool different to many other tools, as it ignores the security on network or system level. It uses command modules from within the web browser to perform requested attacks against the system.
Project details
domain
Introduction
Domain is a Python script written by Jason Haddix to combine the tools Recon-ng and altdns. It allows to use the two tool one multiple domains within the same session.
Project details
domain is written in Python.
Strengths and weaknesses
- + More than 500 GitHub stars
- + The source code of this software is available
- - Unknown project license
Typical usage
- Subdomain enumeration
Faraday
Introduction
Faraday helps teams to collaborate when working on penetration tests or vulnerability management. It stores related security information in one place, which can be easily tracked and tested by other colleagues.
Project details
Faraday is written in Python.
Strengths and weaknesses
- + Commercial support available
- + More than 1000 GitHub stars
- + The source code of this software is available
Typical usage
- Collaboration
- Penetration testing
- Security assessment
- Vulnerability scanning
fsociety
Introduction
The fsociety toolkit is a penetration framework containing other security tools. The project states that is includes all the tools that are used in the Mr. Robot tv series.Project details
fsociety is written in Python.
Strengths and weaknesses
- + More than 10 contributors
- + More than 2000 GitHub stars
- + The source code of this software is available
- - Full name of author is unknown
Typical usage
- Penetration testing
- Security assessment
InstaRecon
Introduction
InstaRecon is a security tool that can help with the reconnaissance phase of a penetration test. It can collect a number of data points with limited input.Project details
InstaRecon is written in Python.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Penetration testing
- Reconnaissance
Metasploit Framework
Introduction
Metasploit is a framework that consists of tools to perform security assignments. It focuses on the offensive side of security and leverages exploit modules.Project details
Metasploit Framework is written in Ruby.
Strengths and weaknesses
- + More than 400 contributors
- + More than 9000 stars
- + Many maintainers
- + The source code of this software is available
- + Supported by a large company
- + Well-known tool
Typical usage
- Penetration testing
- Security assessment
- Vulnerability scanning
OWTF (Offensive Web Testing Framework)
Introduction
OWTF is short for Offensive Web Testing Framework and it is one of the many OWASP projects to improve security.
Project details
OWTF is written in Python.
Strengths and weaknesses
- + More than 25 contributors
- + More than 500 GitHub stars
- + The source code of this software is available
Typical usage
- Penetration testing
- Security assessment
p0f
Introduction
This tool is a great addition to nmap, especially if that reveals not reliable data or none at all. Due to the passive way of working, it won't be detected nor influences any connection.
- Version 3 of p0f is a full rewrite
- The idea for p0f dates back to June 10, 2000
- Tool can run in foreground or as a daemon process
Common uses for p0f include reconnaissance during penetration tests; routine network monitoring; detection of unauthorized network interconnects in corporate environments; providing signals for abuse-prevention tools; and miscellaneous forensics.
Project details
Strengths and weaknesses
- + Project is mature (10+ years)
- + The source code of this software is available
- + Well-known tool
PTF (The PenTesters Framework)
Introduction
PTF or the PenTesters Framework is a Python script to keep your penetration testing toolkit up-to-date. It is designed for distributions running Debian, Ubuntu, Arch Linux, or related clones. PTF will do the retrieval, compilation, and installation of the tools that you use. As it is a modular framework, you can use many of the common pentesting tools or add your own tools.
Project details
PTF is written in Python.
Strengths and weaknesses
- + More than 50 contributors
- + Tool is easy to use
- + More than 1000 GitHub stars
- + The source code of this software is available
Typical usage
- Penetration testing
- Security assessment
- Software management
- Software testing
SearchSploit
Introduction
SearchSploit is a small by OffensiveSecurity to search for exploits and related data in the exploit database (Exploit-DB). This may help penetration testers in their security assignments.
Project details
SearchSploit is written in shell script.
Strengths and weaknesses
- + The source code is easy to read and understand
- + Tool is easy to use
- + Used language is shell script
- - Full name of author is unknown
Typical usage
- Information gathering
- Penetration testing
- Service exploitation
- System exploitation
- Vulnerability testing
Sn1per
Introduction
Sn1per is security scanner that can be used during a penetration test to enumerate and scan for vulnerabilities.Project details
Sn1per is written in Python, shell script.
Strengths and weaknesses
- + More than 10 contributors
- + More than 1000 GitHub stars
- + The source code of this software is available
- - Unknown project license
Typical usage
- Penetration testing
- Reconnaissance
TheDoc
Introduction
TheDoc is a tool written in shell-script to automate the usage of sqlmap. It comes with a built-in admin finder and hash cracker, using the Hashcat tool.Project details
TheDoc is written in shell script.
Strengths and weaknesses
- + Used language is shell script
- + Very low number of dependencies
- + The source code of this software is available
- - Full name of author is unknown
- - Unknown project license
Typical usage
- Penetration testing
aircrack-ng
Introduction
This toolkit focuses on several aspects:
- Testing: Test WiFi devices and capabilities of the driver
- Monitoring: Packet capture and data export
- Attacking: Perform replay attacks, de-authentication, set up fake access points, and perform packet injection
- Cracking: Perform attacks on WEP and WPA PSK (WPA 1 and 2)
Project details
aircrack-ng is written in C.
Strengths and weaknesses
- + Project is mature (10+ years)
- + The source code of this software is available
- + Well-known tool
Typical usage
- Hardware security
- Network scanning
- Security assessment
Some relevant tool missing as an alternative to WarBerryPi? Please contact us with your suggestion.