Archive

Archive for the ‘IT-Tools’ Category

Centron Firewall Iptables GUI Client

May 25th, 2007
Comments Off on Centron Firewall Iptables GUI Client

The Centron IPTables Firewall Gui is an object oriented, database driven, windows interface to linux IPtables firewall rules. The idea is a free Linux based firewall to people who can´t afford expensive commercial grade firewalls and need to have simplified firewall administration.
Read more…

IT-Tools

Microsoft Anti-Cross Site Scripting Library

May 25th, 2007
Comments Off on Microsoft Anti-Cross Site Scripting Library

This download contains the redistributable files for the Microsoft Application Security Anti-Cross Site Scripting Library. The Anti-Cross Site Scripting Library can be used to provide comprehensive protection to web-based applications against Cross-Site Scripting (XSS) attacks.

IT-Tools

Cyberhawk – zero-day protection software

May 25th, 2007
Comments Off on Cyberhawk – zero-day protection software

Novatix’s Cyberhawk is zero-day security software designed for the average consumer. Cyberhawk protects in real-time against viruses, worms, trojans, buffer overflows, rootkits, and even some spyware. It is designed to be used alongside your current antivirus to protect you between antivirus updates. Because it is behavior-based and not signature-based, Cyberhawk protects against both known and unknown, or zero-day, threats.
Read more…

IT-Tools

SQLBrute – Blind SQL Injection

May 25th, 2007
Comments Off on SQLBrute – Blind SQL Injection

SQLBrute is a tool for brute forcing data out of databases using blind SQL injection vulnerabilities. It supports time based and error based exploit types on Microsoft SQL Server, and error based exploit on Oracle. It is written in Python, uses multi-threading, and doesn´t require non-standard libraries.
Read more…

IT-Tools

sshban

May 25th, 2007
Comments Off on sshban

sshban is simple daemon designed to ban SSH-flooders. It´s something like Fail2ban, but much simpler and faster. Instead of scanning system logs, it uses pipe to directly receive data from logger. sshban is written in pure Perl, more information is available inside the script, in perldoc format.

IT-Tools

IM Lock Professional

May 25th, 2007
Comments Off on IM Lock Professional

IM Lock controls and blocks access to Instant Messaging and peer to peer services that waste time and that can infect your home PCs with viruses or even allow your family to be endangered. Blocks all popular services: MSN Messenger, Yahoo Messenger, ICQ, AIM, Skype, eMule, iTunes, and more.
Read more…

IT-Tools

Password Manager XP – store passwords securely

May 25th, 2007
Comments Off on Password Manager XP – store passwords securely

Password Manager XP is a program specially created to help people systematize and store securely valuable information. It rids computer users of headaches caused by lost passwords, forgotten access codes and other sensitive information. With this program, you safely store all your logins, passwords, PIN codes, credit card numbers, access codes, files, and any other confidential information in one place.
Read more…

IT-Tools

Burp – Suite for attacking web applications

May 25th, 2007
Comments Off on Burp – Suite for attacking web applications

Burp suite is an integrated platform for attacking web applications. It contains all of the burp tools (proxy, spider, intruder and repeater) with numerous interfaces between them designed to facilitate and speed up the process of attacking a web application. All plugins share the same robust framework for handling HTTP requests, authentication, downstream proxies, logging, alerting and extensibility.
Read more…

IT-Tools

IoDine – IP over DNS

May 25th, 2007
Comments Off on IoDine – IP over DNS

This is a piece of software that lets you tunnel IPv4 data through a DNS server. This can be usable in different situations where internet access is firewalled, but DNS queries are allowed.
Read more…

IT-Tools

Sandboxie

May 25th, 2007
Comments Off on Sandboxie

Sandboxie requires neither the disabling nor blocking of functions available to Web sites through the browser. Instead, Sandboxie isolates and quarantines the outcome of whatever the Web site may do to your computer, including the installation of unsolicited software. There is no trade-off of functionality for security: the Web site can use the full range of active content tools, and if it uses these tools maliciously to install software or otherwise make changes in your computer, then these changes can be easily undone.
Read more…

IT-Tools