Archive

Archive for the ‘IT-Tools’ Category

SQLBrute – Blind SQL Injection

May 25th, 2007
Comments Off on SQLBrute – Blind SQL Injection

SQLBrute is a tool for brute forcing data out of databases using blind SQL injection vulnerabilities. It supports time based and error based exploit types on Microsoft SQL Server, and error based exploit on Oracle. It is written in Python, uses multi-threading, and doesn´t require non-standard libraries.
Read more…

IT-Tools

sshban

May 25th, 2007
Comments Off on sshban

sshban is simple daemon designed to ban SSH-flooders. It´s something like Fail2ban, but much simpler and faster. Instead of scanning system logs, it uses pipe to directly receive data from logger. sshban is written in pure Perl, more information is available inside the script, in perldoc format.

IT-Tools

IM Lock Professional

May 25th, 2007
Comments Off on IM Lock Professional

IM Lock controls and blocks access to Instant Messaging and peer to peer services that waste time and that can infect your home PCs with viruses or even allow your family to be endangered. Blocks all popular services: MSN Messenger, Yahoo Messenger, ICQ, AIM, Skype, eMule, iTunes, and more.
Read more…

IT-Tools

Password Manager XP – store passwords securely

May 25th, 2007
Comments Off on Password Manager XP – store passwords securely

Password Manager XP is a program specially created to help people systematize and store securely valuable information. It rids computer users of headaches caused by lost passwords, forgotten access codes and other sensitive information. With this program, you safely store all your logins, passwords, PIN codes, credit card numbers, access codes, files, and any other confidential information in one place.
Read more…

IT-Tools

Burp – Suite for attacking web applications

May 25th, 2007
Comments Off on Burp – Suite for attacking web applications

Burp suite is an integrated platform for attacking web applications. It contains all of the burp tools (proxy, spider, intruder and repeater) with numerous interfaces between them designed to facilitate and speed up the process of attacking a web application. All plugins share the same robust framework for handling HTTP requests, authentication, downstream proxies, logging, alerting and extensibility.
Read more…

IT-Tools

IoDine – IP over DNS

May 25th, 2007
Comments Off on IoDine – IP over DNS

This is a piece of software that lets you tunnel IPv4 data through a DNS server. This can be usable in different situations where internet access is firewalled, but DNS queries are allowed.
Read more…

IT-Tools

Sandboxie

May 25th, 2007
Comments Off on Sandboxie

Sandboxie requires neither the disabling nor blocking of functions available to Web sites through the browser. Instead, Sandboxie isolates and quarantines the outcome of whatever the Web site may do to your computer, including the installation of unsolicited software. There is no trade-off of functionality for security: the Web site can use the full range of active content tools, and if it uses these tools maliciously to install software or otherwise make changes in your computer, then these changes can be easily undone.
Read more…

IT-Tools

1Passwd – Password Manager

May 25th, 2007
Comments Off on 1Passwd – Password Manager

1Passwd is a state of the art Password Manager that brings you Security and Convenience. 1Passwd goes beyond just Password Management and adds Form Filling, AutoFill, and Strong Password Generation functionality all built directly into the most popular OS X browsers.
Read more…

IT-Tools

Pirana SMTP Content Exploitation Framework

May 25th, 2007
Comments Off on Pirana SMTP Content Exploitation Framework

Email has become an essential service for most people – who doesn´t own an email address today? With time, it seemed obvious that numerous threats would come to light and propagate through this communication channel.
Read more…

IT-Tools

NatACL – firewall group policy controller

May 25th, 2007
Comments Off on NatACL – firewall group policy controller

NatACL is a firewall group policy controller for intranets and the Internet. It is made of 3 main programs: a DHCP server, a Web authenticator, and a statistic collector. It forces users to use a DHCP client.
Read more…

IT-Tools