Blackarch pacman package groups
Install with pacman -S groupname to quickly install a bunch of tools in one command:
This info is available in the blackarch developers guide here: https://blackarch.org/blackarch-guide-en.pdf
– this post is a copy-paste of that info – there are a lot of red-team things in the list,
but to blue-team you need to know what the red-team have at their disposal
(and thats why I have included it here, if you dont use these tools responsibly, then that’s your fault, not mine)
If you dont know what defines a red-team and blue-team, then you probably shouldnt use these tools,
they could end you in a lot of trouble if you can’t control them, or if you point them at the wrong network
3.2.1 Groups
To allow users to install a specific range of packages quickly and easily, packages have been separated
into groups. Groups allow users to simply go “pacman -S group-name” in order to pull a lot of
packages.
blackarch
The blackarch group is the base group that all packages must belong too. This allows users to install
every package with ease.
What should be in here: Everything.
https://blackarch.org/tools.html
blackarch-anti-forensic
Packages that are used for countering forensic activities, including encryption, steganography, and
anything that modifies files/file attributes. This all includes tools to work with anything in general
that makes changes to a system for the purposes of hiding information.
Examples: luks, TrueCrypt, Timestomp, dd, ropeadope, secure-delete
blackarch-automation
Packages that are used for tool or workflow automation.
Examples: blueranger, tiger, wiffy
blackarch-backdoor
Packages that exploit or open backdoors on already vulnerable systems.
Examples: backdoor-factory, rrs, weevely
blackarch-binary
Packages that operate on binary files in some form.
Examples: binwally, packerid
blackarch-bluetooth
Packages that exploit anything concerning the Bluetooth standard (802.15.1).
Examples: ubertooth, tbear, redfang
blackarch-code-audit
Packages that audit existing source code for vulnerability analysis.
Examples: flawfinder, pscan
blackarch-cracker
Packages used for cracking cryptographic functions, ie hashes.
Examples: hashcat, john, crunch
blackarch-crypto
Packages that work with cryptography, with the exception of cracking.
Examples: ciphertest, xortool, sbd
blackarch-database
Packages that involve database exploitations on any level.
Examples: metacoretex, blindsql
blackarch-debugger
Packages that allow the user to view what a particular program is ”doing” in realtime.
Examples: radare2, shellnoob
blackarch-decompiler
Packages that attempt to reverse a compiled program into source code.
Examples: flasm, jd-gui
blackarch-defensive
Packages that are used to protect a user from malware & attacks from other users.
Examples: arpon, chkrootkit, sniffjoke
blackarch-disassembler
This is similar to blackarch-decompiler, and there will probably be a lot of programs that fall into
both, however these packages produce assembly output rather than the raw source code.
Examples: inguma, radare2
blackarch-dos
Packages that use DoS (Denial of Service) attacks.
Examples: 42zip, nkiller2
blackarch-drone
Packages that are used for managing physically engineered drones.
Examples: meshdeck, skyjack
blackarch-exploitation
Packages that takes advantages of exploits in other programs or services.
Examples: armitage, metasploit, zarp
blackarch-fingerprint
Packages that exploit fingerprint biometric equipment.
Examples: dns-map, p0f, httprint
blackarch-firmware
Packages that exploit vulnerabilities in firmware
Examples: None yet, amend asap.
blackarch-forensic
Packages that are used to find data on physical disks or embedded memory.
Examples: aesfix, nfex, wyd
blackarch-fuzzer
Packages that use the fuzz testing principle, ie ”throwing” random inputs at the subject to see what
happens.
Examples: msf, mdk3, wfuzz
blackarch-hardware
Packages that exploit or manage anything to do with physical hardware.
Examples: arduino, smali
blackarch-honeypot
Packages that act as ”honeypots”, ie programs that appear to be vulnerable services used to attract
hackers into a trap.
Examples: artillery, bluepot, wifi-honey
blackarch-keylogger
Packages that record and retain keystrokes on another system.
Examples: None yet, amend asap.
blackarch-malware
Packages that count as any type of malicious software or malware detection.
Examples: malwaredetect, peepdf, yara
blackarch-misc
Packages that don’t particularly fit into any categories.
Examples: oh-my-zsh-git, winexe, stompy
blackarch-mobile
Packages that manipulate mobile platforms.
Examples: android-sdk-platform-tools, android-udev-rules
blackarch-networking
Package that involve IP networking.
Examples: Anything pretty much
blackarch-nfc
Packages that use nfc (near-field communications).
Examples: nfcutils
blackarch-packer
Packages that operate on or invlove packers.
packers are programs that embed malware within other executables.
Examples: packerid
blackarch-proxy
Packages that acts as a proxy, ie redirecting traffic through another node on the internet.
Examples: burpsuite, ratproxy, sslnuke
blackarch-recon
Packages that actively seeks vulnerable exploits in the wild. More of an umbrella group for similar
packages.
Examples: canri, dnsrecon, netmask
blackarch-reversing
This is an umbrella group for any decompiler, disassembler or any similar program.
Examples: capstone, radare2, zerowine
blackarch-scanner
Packages that scan selected systems for vulnerabilities.
Examples: scanssh, tiger, zmap
blackarch-sniffer
Packages that involve analyzing network traffic.
Examples: hexinject, pytactle, xspy
blackarch-social
Packages that primarily attack social networking sites.
Examples: jigsaw, websploit
blackarch-spoof
Packages that attempt to spoof the attacker such, in that the attacker doesn’t show up as an attacker
to the victim.
Examples: arpoison, lans, netcommander
blackarch-threat-model
Packages that would be used for reporting/recording the threat model outlined in a particular scenario.
Examples: magictree
blackarch-tunnel
Packages that are used to tunnel network traffic on a given network.
Examples: ctunnel, iodine, ptunnel
blackarch-unpacker
Packages that are used to extract pre-packed malware from an executable.
Examples: js-beautify
blackarch-voip
Packages that operate on voip programs and protocols.
Examples: iaxflood, rtp-flood, teardown
blackarch-webapp
Packages that operate on internet-facing applications.
Examples: metoscan, whatweb, zaproxy
blackarch-windows
This group is for any native Windows package that runs via wine.
Examples: 3proxy-win32, pwdump, winexe
blackarch-wireless
Packages that operates on wireless networks on any level.
Examples: airpwn, mdk3, wiffy