Archive

Archive for the ‘IT-Tools’ Category

Oedipus – Web Application Security Scanner

May 25th, 2007
Comments Off on Oedipus – Web Application Security Scanner

Oedipus is an open source web application security analysis and testing suite developed by Penetration Testers for Penetration Testers. It is capable of parsing different types of log files off-line and identifying several security vulnerabilities. Using the analyzed information, Oedipus can then dynamically test web sites for application and web server vulnerabilities.
Read more…

IT-Tools

Wapiti – Web application vulnerability scanner

May 25th, 2007
Comments Off on Wapiti – Web application vulnerability scanner

Wapiti allows you to audit the security of your web applications. It performs “black-box” scans, i.e. it does not study the source code of the application but will scans the webpages of the deployed webapp, looking for scripts and forms where it can inject data. Once it gets this list, Wapiti acts like a fuzzer, injecting payloads to see if a script is vulnerable.
Read more…

IT-Tools

Net Tool Box

May 25th, 2007
Comments Off on Net Tool Box

Net Tool Box is a multi-purpose network utility for Mac OS X. It integrates over 20 powerful networking utilities into one easy-to-use program. The intuitive design and hardcore features of Net Tool Box ease the workload for thousands of networking professionals, developers, administrators and educators every day.

IT-Tools

Proactive Security Auditor

May 25th, 2007
Comments Off on Proactive Security Auditor

Proactive Password Auditor is a password security test tool that´s designed to allow Windows NT, Windows 2000, Windows XP and and Windows Server 2003-based systems administrators to identify and close security holes in their networks.
Read more…

IT-Tools

FirePhish – Firefox Anti-phishing Toolbar

May 25th, 2007
Comments Off on FirePhish – Firefox Anti-phishing Toolbar

FirePhish is a cross-platform anti-phishing toolbar for Firefox that utilizes the Open Phishing Database to provide the user with information and tools to protect against phishing attacks. FirePhish is part of The Open Phishing Database project.
Read more…

IT-Tools

fwknop – Single Packet Authorization

May 25th, 2007
Comments Off on fwknop – Single Packet Authorization

fwknop stands for the FireWall KNock OPerator, and implements an authorization scheme called Single Packet Authorization (SPA) that based around Netfilter and libpcap.
Read more…

IT-Tools

Bluediving Bluetooth Penetration Testing Suite

May 25th, 2007
Comments Off on Bluediving Bluetooth Penetration Testing Suite

Bluediving is a Bluetooth penetration testing suite. It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack, and has features such as Bluetooth address spoofing and a RFCOMM socket shell.
Read more…

IT-Tools

SpyDefense

May 25th, 2007
Comments Off on SpyDefense

SpyDefense protects your computer against annoying, and harmful software such as Spyware, Adware, Trojan horses, etc. SpyDefense is anti-spyware software that prides itself on a very user friendly environment. SpyDefense utilizes our proprietary technologies to provide advanced spyware scanning, and removal quickly and precisely. Combining our unique scanning technology with user friendly controls and interface, provides a complete spyware software package for users of all skill levels.

IT-Tools

Acunetix Web Vulnerability Scanner

May 25th, 2007
Comments Off on Acunetix Web Vulnerability Scanner

Hackers are concentrating their efforts on attacking applications in your website: 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Web applications are accessible 24 hours a day, 7 days a week and control sensitive data such as customer details, credit card numbers and proprietary corporate data.
Read more…

IT-Tools

TrackMeNot – Firefox extension to protect against data-profiling

May 25th, 2007
Comments Off on TrackMeNot – Firefox extension to protect against data-profiling

TrackMeNot is a lightweight browser extension that protects web-searchers against surveillance and data-profiling. It does so not by means of concealment or encryption (i.e. covering one´s tracks), but instead, paradoxically, by the opposite strategy: noise and obfuscation.
Read more…

IT-Tools