martes, 3 de marzo de 2015

Reaver wps - Brute force attack against Wifi Protected Setup -

Reaver wps implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as described in 
http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf 

Reaver performs a brute force attack against an access point's WiFi Protected Setup pin number. Once the WPS pin is found, the WPA PSK can be recovered and alternately the AP's wireless settings can be reconfigured.  While Reaver does not support reconfiguring the AP, this can be accomplished with wpa_supplicant once the WPS pin is known. 

DESCRIPTION

Reaver targets the external registrar functionality mandated by the WiFi Protected Setup specification. Access points will provide authenticated registrars with their current wireless configuration (including the WPA PSK), and also accept a new configuration from the registrar.
In order to authenticate as a registrar, the registrar must prove its knowledge of the AP's 8-digit pin number. Registrars may authenticate themselves to an AP at any time without any user interaction. Because the WPS protocol is conducted over EAP, the registrar need only be associated with the AP and does not need any prior knowledge of the wireless encryption or configuration.
Reaver performs a brute force attack against the AP, attempting every possible combination in order to guess the AP's 8 digit pin number. Since the pin numbers are all numeric, there are 10^8 (100,000,000) possible values for any given pin number. However, because the last digit of the pin is a checksum value which can be calculated based on the previous 7 digits, that key space is reduced to 10^7 (10,000,000) possible values.
The key space is reduced even further due to the fact that the WPS authentication protocol cuts the pin in half and validates each half individually. That means that there are 10^4 (10,000) possible values for the first half of the pin and 10^3 (1,000) possible values for the second half of the pin, with the last digit of the pin being a checksum.

Reaver brute forces the first half of the pin and then the second half of the pin, meaning that the entire key space for the WPS pin number can be exhausted in 11,000 attempts. The speed at which Reaver can test pin numbers is entirely limited by the speed at which the AP can process WPS requests. Some APs are fast enough that one pin can be tested every second; others are slower and only allow one pin every ten seconds. Statistically, it will only take half of that time in order to guess the correct pin number.

INSTALLATION

Reaver is only supported on the Linux platform, requires the libpcap and libsqlite3 libraries, and can be built and installed by running:
                $ ./configure
                $ make
                # make install

USAGE

Usually, the only required arguments to Reaver are the interface name and the BSSID of the target AP:
                # reaver -i mon0 -b 00:01:02:03:04:05
The channel and SSID (provided that the SSID is not cloaked) of the target AP will be automatically identified by Reaver, unless explicitly specified on the command line:
                # reaver -i mon0 -b 00:01:02:03:04:05 -c 11 -e linksys
By default, if the AP switches channels, Reaver will also change its channel accordingly. However, this feature may be disabled by fixing the interface's channel:
                # reaver -i mon0 -b 00:01:02:03:04:05 --fixed
The default receive timeout period is 5 seconds. This timeout period can be set manually if necessary (minimum timeout period is 1 second):
                # reaver -i mon0 -b 00:01:02:03:04:05 -t 2
The default delay period between pin attempts is 1 second. This value can be increased or decreased to any non-negative integer value. A value of zero means no delay:
                # reaver -i mon0 -b 00:01:02:03:04:05 -d 0
Some APs will temporarily lock their WPS state, typically for five minutes or less, when "suspicious" activity is detected. By default when a locked state is detected, Reaver will check the state every 315 seconds (5 minutes and 15 seconds) and not continue brute forcing pins until the WPS state is unlocked. This check can be increased or decreased to any non-negative integer value:
                # reaver -i mon0 -b 00:01:02:03:04:05 --lock-delay=250
For additional output, the verbose option may be provided. Providing the verbose option twice will increase verbosity and display each pin number as it is attempted:
                # reaver -i mon0 -b 00:01:02:03:04:05 -vv
The default timeout period for receiving the M5 and M7 WPS response messages is .1 seconds. This timeout period can be set manually if necessary (max timeout period is 1 second):
                # reaver -i mon0 -b 00:01:02:03:04:05 -T .5
Some poor WPS implementations will drop a connection on the floor when an invalid pin is supplied instead of responding with a NACK message as the specs dictate. To account for this, if an M5/M7 timeout is reached, it is treated the same as a NACK by default. However, if it is known that the target AP sends NACKS (most do), this feature can be disabled to ensure better reliability. This option is largely useless as Reaver will auto-detect if an AP properly responds with NACKs or not:
                # reaver -i mon0 -b 00:01:02:03:04:05 --nack
While most APs don't care, sending an EAP FAIL message to close out a WPS session is sometimes necessary. By default this feature is disabled, but can be enabled for those APs that need it:
                # reaver -i mon0 -b 00:01:02:03:04:05 --eap-terminate
When 10 consecutive unexpected WPS errors are encountered, a warning message will be displayed. Since this may be a sign that the AP is rate limiting pin attempts or simply being overloaded, a sleep can be put in place that will occur whenever these warning messages appear:
                # reaver -i mon0 -b 00:01:02:03:04:05 --fail-wait=360
 
License: GNU GLPv2
 
Download Link:
 
 
 

jueves, 26 de febrero de 2015

OPHCRACK -- A Windows password cracker based on rainbow tables -


 Ophcrack is a Windows password cracker based on a time-memory trade-off using rainbow tables. This is a new variant of Hellman's original trade-off, with better performance. It recovers 99.9% of alphanumeric passwords in seconds.

Features:

  • » Runs on Windows, Linux/Unix, Mac OS X, ...
  • » Cracks LM and NTLM hashes.
  • » Free tables available for Windows XP and Vista/7.
  • » Brute-force module for simple passwords.
  • » Audit mode and CSV export.
  • » Real-time graphs to analyze the passwords.
  • » LiveCD available to simplify the cracking.
  • » Dumps and loads hashes from encrypted SAM recovered from a Windows partition.
  • » Free and open source software (GPLv2).
Attention: Some AV could be False Positives. In case of any problem, utilize LiveCD Software.
Level: Expert

Download Link:

OPHCRACK

ULTRAVNC - VNC remote access tools

Ultra VNC is a powerful, easy to use and free - remote pc access softwares - that can display the screen of another computer (via internet or network) on your own screen. The program allows you to use your mouse and keyboard to control the other PC remotely. It means that you can work on a remote computer, as if you were sitting in front of it, right from your current location.

VNC, the Remote Frame Buffer protocol (RFB) allows a desktop to be viewed and controlled remotely over the Internet. A VNC server must be run on the computer sharing the desktop, a VNC client must be run on the computer that will access the shared desktop. 


License: GLPv2

Level: Expert 

 Download Link:

Nmap - A free utility for network exploration or security auditing. -


Nmap ("Network Mapper") is a free and open source utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.


Features


  • Host discovery - Identify hosts on a network.
  • Port scanning - Enumerate the open ports on one or more target hosts.
  • Version detection - Interrogate network services listening on remote devices to determine the application name and version number.
  • OS detection - Remotely determine the operating system and some hardware characteristics of network devices.
  • Scriptable interaction with the target - Using Nmap Scripting Engine and the Lua language, customized queries can be made.
  • Reverse DNS lookup.
  • Find device type information.
  • Retrieve MAC addresses.
  • License: GLPv2
Level: EXPERT

Download Link:

Nmap free




DeSmuME - An emulator for NDS roms and Nintendo DS Lite games -

DeSmuME is a Nintendo DS emulator. Its name is derived from emu (which is short for emulator), DS and ME. DeSmuME supports DS homebrew nds roms and demo programs, including a handful of wireless multi-boot nds roms.

WiFi not emulated and not supported!! 

 Features
  • Supports the following:
  • DeSmuME v0.9.10 Windows 32 bit binary
  • DeSmuME v0.9.10 Mac binary
  • DeSmuME v0.9.10 source for Windows
  • DeSmuME v0.9.10 Windows 64 bit binary
  • DeSmuME v0.9.10 Windows 32 bit binary (non-SSE2 build)
  • License: GLPv2
 Level: Novice

Download link:

DeSmuME

domingo, 22 de febrero de 2015

EASY WIFI - makes your Win 8 PC into a Wi-Fi Hotspot easily and quickly -

Easy Wi-Fi is a simple but powerful tool to make your Windows 8 PC into a Wi-Fi Hotspot easily and quickly. It can also connect your PC with different devices that have WLAN. It's also compatible with Windows 7/Vista.

VERSION:
1.0.0

REQUIREMENT:
WLAN with updated driver.

License: GLPv2

Level: Novice

Download Link: 

Angry IP Scanner - A cross-platform network scanner that is fast and simple to use -

Angry IP Scanner (or simply ipscan) is an open-source and cross-platform network scanner designed to be fast and simple to use. It scans IP addresses and ports as well as has many other features.
It is widely used by network administrators and just curious users around the world, including large and small enterprises, banks, and government agencies.
It runs on Linux, Windows, and Mac OS X, possibly supporting other platforms as well.

License: GLPv2

Level: Intermediate

Download Link Angry IP Windows 32 bits::

Angry IP Scanner

PORTABLE SOFTWARE FOR USB - Portable software for USB, portable, and cloud drives -

PortableApps is an open source, application launcher that you install directly to your USB or cloud drive and use on any PC. You can download hundreds of portable applications from the PortableApps integrated directory, like Firefox, Skype, and more. This means you take your browser with your bookmarks and extensions, your office suite, your photo editor, your music collection, your games, your development tools, and more with you everywhere you go. And because everything stays on your drive, every PC becomes your PC. Additional features include integrated backup, interface themes, a search option, support for personal files, favorites and more.

PortableApps.com at a Glance

It took a few minutes to install the PortableApps Platform, and several more to install six apps including ClamWin, Firefox, GIMP, KeePass, Skype, and Stellarium. To start, we launched the heavyweight GIMP without a hitch, while each additional app opened just as quickly. The idea of carrying apps around on a USB seems plausible but the idea of loading the PortableApps Platform to Dropbox, or the like, seems like an even better idea. So, without further adieu, consider trying the PortableApps Platform, especially if you’ve been thinking about the best way to take your apps for a joy ride.

Product Details

Here is a detailed breakdown of PortableApps’ features:

  • Take your apps everywhere—PortableApps lets you carry all your favorite apps on a portable device or cloud drive and use them on any PC.
  • Use a portable device, cloud directory, or local drive—The PortableApps Platform comes with a smart installer that easily installs your environment to a portable device, a cloud drive (Dropbox, Google Drive, etc.), or a local PC, so you can safely back up data to the cloud.
  • Quickly find and install apps—PortableApps has a built-in app store that lists apps by category, title, or new and recently updated so you can install the apps you want with just a few clicks. And there’s no download limit.
  • Easily organize apps—Grow and organize your app collection with folders that group them automatically or as you see fit. Pick favorites and have the menu learn what to keep up front and center. Or use the search to find what you're looking for.
  • Easily update apps—When a new security fix for your browser is released or a new feature in your favorite game is available, the PortableApps Updater automatically lets you know. Just click a button and the updates are downloaded and installed without messing up your settings and saved files.
  • Personalize your app menu—With a dozen bundled themes, each with a rainbow of color selections, the PortableApps Platform lets you pick a different look every day for months and never have the same menu twice.
  • Take your fonts along too—The PortableApps Platform supports the ability to carry fonts on your portable device and use them with your portable software without needing to install them on the local machine.
  • Advanced Features—The PortableApps Platform has the power and the options to work the way you want. And if there's something we haven't added that you'd like to see, just ask in the forums. We add new features every month!

Pros

Cons

PortableApps has over 300 apps, all 100% free, legal, and portable, which can be installed and automatically updated for you in the PortableApps Platform. None really, because when you encounter issues, you’ll find links in the community forum where 180,000 developers, translators, users and fans are ready to help you!

Quick Specs

  • Version: 12.0.5
  • Date added: September 10, 2014
  • Operating systems: Windows, plus Linux, Unix, and BSD via Wine, and Mac OS X via CrossOver, Wineskin, WineBottler, and PlayOnMac.
  • License: GPLv2
 Level: Intermediate

Download Link:

Portable Software for USB

Notepad++ Plugin Manager

Notepad ++ Plugin Manager:

Plugin Manager is a plugin for Notepad++ that allows you to install, update and remove plugins from Notepad++. A centrally hosted XML file holds the list of plugins, that the plugin manager downloads and processes against the list of installed plugins.
 

Features

  • Install, Update and Remove all existing plugins
  • Notify when an installed plugin has an update available, and allow the user to update directly
  • Calculate dependencies between plugins, any plugin can depend on another plugin, which will be installed automatically if the user installs the initial plugin
  • Install all supplemental files as well as the plugin file itself (e.g. config, doc, extra libraries)
  • Automatic installation of the correct version (ANSI/Unicode) for your Notepad++
  • Validation of DLLs copied, against a central list of valid files. This slightly mitigates the risk of automatically downloading updates.
  • Only plugins that are compatible with your Notepad++ are shown
  • Plugins can be put into categories - a suggestion was made of "Official, Common and Others". Currently all plugins are in the "Others" category, as I think there needs to be some agreement as to what determines an "Official" plugin and which plugins are "Common".
  • Plugin Manager is able to update itself, and will notify the user when an update is available
  • Proxies are supported, just change the setting
  • Updates can be ignored, and the user will not be alerted to that update again, until a further new version of that plugin is released.
  • The local plugin list file is only downloaded when something has changed - the MD5sum of the file is compared to the server's version, and if it is different, then a new copy is downloaded.
  • New for 0.9: Works with plugins that are installed multiple times - update them all or individually
Important note for Vista / Windows 7: In order to update the plugin manager to 1.0.8 , you need to run Notepad++ as administrator, update plugin manager, then everything will run properly under a normal user. Future updates to Plugin Manager will automatically run as administrator.

Level: Advanced

Donwload Link:

eMule - A free peer-to-peer (P2P) file sharing client -

eMule is a free peer-to-peer (P2P) file-sharing client for Microsoft Windows that was launched in 2002 as an alternative to eDonkey2000. To date, eMule is one of the world’s largest and most trustworthy P2P file-sharing clients. eMule includes advanced search features, file checks for corruptions while downloading, a preview while downloading function, and a credit system to reward frequent uploads.

Editor Review's:

eMule is one of the world’s largest and most trusted P2P file-sharing clients, allowing you to quickly find any type of file (audio, video, text, etc.), including some extremely rare content. eMule connects to both the eDonkey and the Kad networks, which results in a higher transfer speed and faster distribution of popular files. With a vast network of servers and clients (like you) uploading and downloading files all over the world respectively, eMule reduces recovery times for corrupted downloads. Additionally, a credit system rewards you for frequent uploads, cutting down wait time where you are owed credit. And eMule helps you save bandwidth by transmitting data in zlib-compressed form.


eMule at a Glance

eMule is easy to install with its quick start wizard; however, it may intimidate beginners when it asks for some networking information upfront, which you can either enter or bypass. Upon launch, eMule displays the Server tab with a list of servers to connect to, where finding content is as easy as typing the filename, and adding search conditions. You can chat with friends across the globe using eMule’s built in IRC client. And the Share Files tab lets you keep track of your shares, including requests, accepted uploads, and transferred files.

Product Details

Here is a detailed breakdown of eMule’s features:

  • Kad network support—eMule supports the Kad network using the Kademlia protocol, which acts as a distributed system.
  • Queue and credit system—You get the files you want with rewards for your uploads to the network.
  • Intelligent corruption control—eMule checks files for corruption during downloads to confirm that they are error free, helping speed up the correction of corrupted chunks so that they do not need to be re-downloaded entirely.
  • Simultaneous downloads with preview—You can start a series of downloads and preview videos while they are in progress.
  • Built in Web services/server—You can quickly access local, global, and Web-based servers (Jigle and Filedonkey) across the Internet.
  • Advanced search—eMule provides Boolean searches, adding flexibility to your inquiries.
  • Messaging system—You can chat with friends across the globe using eMule’s built in IRC client. And a friend’ list lets you see when friends are online.

Pros

Cons

With eMule it’s easy to share a wide selection of file types and download some some extremely rare files, while it filters corrupt Web files. eMule doesn’t automatically configure firewalls. At times, downloads may slow but configuring the upload/download speed helps.

Quick Specs

  • Version: .50a
  • File size: 3.23MB
  • Date added: July 7, 2010
  • Operating systems: Windows
  • License:  GPLv2
 Level: Novice
Link to Download:
 
eMule


SWISS FILE KNIFE - Multi function command line tool that belongs onto every usb stick. -

Swiss File Knife- a command line tools collection -

A hundred command line tools in one executable. Find and extract text in binary files, list dir tree sizes, filter and replace text, run an instant ftp server, http server for easy file transfer, find duplicate files, join many text files into one, create and verify md5 checksum lists, run a command on all files, detab text, create hexdumps from files, trace contents of a tcp connection, find dependencies between files, print colored text to terminal, locate commands in the path, print last lines of a file, convert CR/LF, hex to binary, binary to source code, split and join large files, list the contents of all .zip .jar .tar.gz and .tar.bz2 files. Fully portable, for USB stick, without installation. For Windows, Linux and Mac. Source code should compile on further platforms as well, like embedded Linux.




Features


  • text file filter and replace
  • command line grep and find for text and binary files
  • run command on all files of a directory tree
  • instant command line ftp and http server for windows and linux
  • instant command line file transfer between windows and linux
  • find duplicate files by content
  • split and join large files
  • create and verify md5 lists of files
  • detab text files
  • convert between lf (unix) and crlf (windows) line endings
  • show head or tail of text files
  • create hexdump of binary files
  • list files of directory tree by time, size, name pattern
  • list directory differences showing added or changed files
  • list nested .zip .tar .tar.gz .tar.bz2 archive contents
  • print traffic of a tcp, http, udp connection
  • command line file tool package without installation
  • multi function file tool for usb stick
  • License: BSD License
Very Useful Tool!!!!

Level: Expert

 Download Link:

Swiss File Knife

Duplicates File Finder

Duplicate Files Finder is a cross-platform application for finding and removing duplicate files by deleting, creating hardlinks or creating symbolic links. A special algorithm minimizes the amount of data read from disk, so the program is very fast.

Duplicate Files Finder supports the following platforms:
  • The Windows 9x family (Windows 95, 98, ME)
  • The Windows NT family (Windows NT, XP, 2000, Vista)
  • POSIX-like operating systems (Unix, Linux)

Features

  • Byte by byte comparison
  • Fast search
  • Support for hardlinks and symbolic links
  • User interface for deleting files and creating links
  • Many search options
  •  License: GPLv2  
 Level: Novice

Download File Windows Version:

Duplicates File Finder

KEE PASS PASSWORD SAFE - A lightweight and easy-to-use password manager -


KeePass is a portable password manager for PC (Windows, Linux, Mac OS X), with ports available for Android, iPhone, iPad, and more. Let’s face it, most of us use the same password over and over to avoid password management but this practice is highly risky. It means if someone gains or cracks your password, they could log into any of your accounts, stealing data and jeopardizing your security. Having a separate, lengthy, and random password for every site is considered the best way to secure data. KeePass keeps every username and password pair in an encrypted database, protected by a single master password or key (the only one you have to remember). And it doesn’t store your database in the cloud unless you upload it there.

KeePass at a Glance

You can easily download KeePass for Windows and you can port it on a USB stick for most other operating systems. The interface is as busy as it is robust. For example, KeePass supports password groups for sorting passwords. You can drag and drop passwords into most windows or use a hot key to type your login information into windows automatically. You can also quick copy user names and passwords to the clipboard with a double-click on a field in the password list. And KeePass can import data from a variety of formats like CSV, while the password list can be exported to formats such as TXT, HTML, XML, and CSV.

Product Details

Here is a detailed breakdown of KeePass’s features:
  • Strong security—KeePass uses AES encryption to encrypt its password databases, SHA-256 password hash, protection against dictionary and guessing attacks, in-memory protection, and more.
  • Portable—KeePass is portable, carry it on a USB stick and run it or directly install it on Windows if you prefer desktop access.
  • Easy Database Transfer—A password database, containing a single file, is easy to transfer between computers.
  • Multiple user keys—Use a master password to decrypt the complete database or carry a key file with you.
  • Powerful password generator—KeePass generates passwords based on character sets and patterns, with many options.
  • Extensible—KeePass provides plugin architecture for advanced features and supports over 40 languages.

Pros

Cons

KeePass has a powerful password generator and is available with multi-factor authentication, and it can handle non-standard login sequences. Plugins provide advanced features. KeePass takes a while to warm up to, with its feature-filled interface that might confuse some beginners, but a help center is available to assist you as you find your way around.

Quick Specs

  • Version: 2.27
  • File size: 2.5 MB
  • Date added: June 7, 2014
  • Operating systems: Windows, Linux, Mac OS X, Android mobile devices, and more.
 Level: Intermediate

Download Link:

Kee Pass Password Safe

7-ZIP - A free file archiver for extremely high compression -

7- ZIP is a file archiver with a high compression ratio for ZIP and GZIP formats, which is between 2 to 10% better than its peers, depending on the exact data tested. And 7-Zip boosts its very own 7z archive format that also offers a significantly higher compression ratio than its peers—up to 40% higher! This is mainly because 7-Zip uses LZMA and LZMA2 compression, with strong compression settings and dictionary sizes, to slow but vastly improve density. If a zip tool gains its appeal from its ability to efficiently compress files, then 7-Zip proves it has a little bit o’ magic.

7-Zip at a Glance

After you effortlessly download and launch 7-Zip, you’ll quickly discover its simple and easy to navigate interface. The main toolbar contains 7-Zip’s most used features and there are several menus that allow you to dig deeper within. For example, the Extract button lets you easily browse for or accept the default destination directory for your file, while the View menu contains a Folder History, and the Favorites menu lets you save up to ten folders. 7-Zip also integrates with the Windows Explorer menus, displaying archive files as folders and providing a toolbar with drag-and-drop functions. You can also alternate between a single or dual-pane view.

Product Details

7-Zip offers several features that make it one of the best compression software options around. For example:


  • Open architecture—The source code uses the GNU LGPL license, while the unRAR code is under a mixed license with GNU LGPL + unRAR restrictions.
  • High compression ratio—Using its own 7z format with LZMA and LZMA2 compression, 7-Zip’s compression ratio is up to 40% higher than its peers. For ZIP and GZIP formats, 7-Zip provides a compression ratio that is 2-10% better than PKZip and WinZip.
  • Strong AES-256 encryption—This includes both password protection of files and encryption of file names.
  • Integrates with Windows Shell—Using its menu options, you can integrate 7-Zip to the Windows Shell menu.
  • Powerful file manager and command line versions—There’s also a plugin for FAR Manager.
  • Localizations for 79 languages—This kind of support is why 7-Zip is the world’s favorite free compression software.

Pros

Cons

7-Zip is easy to download and use, it opens and compresses most everything, and is has a Windows shell extension. The interface is a little sparse and so are the instructions, but the program works like a charm anyway.

Quick Specs


  • Version: 9.22
  • File size: 1.1 MB
  • Date added: March 2, 2013
  • Operating systems: Windows
Level: Novice

Download Link:

7-ZIP Download

 

Anti-Spam SMTP Proxy Server

The Anti-Spam SMTP Proxy (ASSP) Server project aims to create an open source platform-independent SMTP Proxy server which implements auto-whitelists, self learning Bayesian, Greylisting, DNSBL, DNSWL, URIBL, SPF, SRS, Backscatter, Virus scanning, attachment blocking, Senderbase and multiple other filter methods. Click 'Browse all files' to download the professional version 2.4.3 build 14349.

V1 development has been stopped at the end of 2014 (1.10.1 build 14365). Possibly there will be done some bugfixing in future.

Please upgrade to V2, which is and will be actively maintained.


Features


  • Multiple Weighted DNSBLs
  • Multiple Weighted URIBLs
  • Greylisting
  • Weighted Regular Expression Filtering
  • Bayesian
  • Penalty Box
  • SenderBase
  • SSL/TLS
  • SPF/SRS
  • Attachment Blocking
  • ClamAV and FileScan
  • Blocking Reporting
  • LDAP support
  • Backscatter Detection
  • V2 - recipient replacement / GUI user access rights management
  • V2 - MIME charset conversion / DKIM check and signing
  • V2 - DB support for all hashes / level based open plugin support
  • V2 - transparent proxy support / BATV check and signing
  • V2 - Plugins: archive, full attachment check and replacement, OCR
  • V2 - damping (steal spammers time)
  • V2 - AUTH to relay host / POP3 collector
  • V2 - configuration value and file synchronization
  • V2 - Block Reports design could be customized
  • V2 - Razor2 and DCC support via Plugin
  • V2 - SNMP support (monitoring, configuring, controll-API)
  • V2 - user group import (file or LDAP or command based)
  • V2 - automatic crash analyzer Hidden Markov Model
  • V2 - IPv6 socket support
  • V2 - word stemming (several languages) for Bayesian analyzer
  • V2 - Perl module autoupdate via PPM or CPAN
  • V2 - Hidden Markov Model spam detection engine
  • V2 - full unicode support
  • V2 - DMARC support
  • V2 - privat Whitelist (legacy, domain based, user based)
  • V2 - privat IP and Domain lists (legacy, domain based, user based)
  • V2 - CPU affinity settings
  • V2 - web file commander
  • V2 - graphical statistic output (SVG)
  • V2 - native SSL support for target hosts
  • V2 - client SSL-certificate validation 
  • License: GLPv2
Level: Expert

 Download Link:

Anti-Spam SMTP Proxy Server

FILEZILLA - A fast cross-platform FTP client -

FileZilla is a cross-platform graphical FTP, SFTP, and FTPS file management tool for Windows, Linux, Mac OS X, and more. With tons of intuitive tools, FileZilla helps you quickly move files between your computer and Web server. If you plan to use FileZilla regularly, you might like the advanced features like manual configuration and speed limit monitoring. While FTP may seem outdated, it’s actually a very reliable way to transfer large files or groups of files to your Web server. And, with FileZilla, you can deploy multiple simultaneous connections to speed up file transfers. Overall, FileZilla has everything you need to support your FTP needs including a documentation wiki and a forum.

Filezilla at a Glance

Filezilla is so easy to download and launch that you might not realize how powerful it is. Just enter a few basic server settings and you’re up and running with a single click. To upload and download files, simply drag and drop them between your Web server and computer. You monitor your actions in the site manager pane, which highlights the status of file uploads and downloads, or bypass the queue with manual transfer. You can also pause or cancel file transfers and even configure transfer speed limits to reduce file transfer errors, making the process of managing your Web site a breeze!

Product Details

Here is a detailed breakdown of Filezilla’s features:

  • FTP, FTPS, and SFTP support—Filezilla gives you a choice between several file transfer protocols and encryption methods, while supporting HTTP and the IPv6 Internet protocol.
  • Vital Info at a Glance—Filezilla lets you compare your files with server files in the same directory to see if their file name or size is out of sync via highlighted colors..
  • Built-in file management—A site manager lets you order transfer tasks via a server list and a transfer queue. It also supports resume, which means you can pause and continue transfers. Filename filters help locate specific files with the conditions you want. And you can edit server files on-the-fly, without downloading and re-uploading them back to the server.
  • Easy to navigate—A tabbed user interface allows you to multitask browse servers to transfer files between them simultaneously. Bookmarks provide easy access to frequently used files. You can also drag and drop files between your computer and Web server.
  • Advanced file settings—You can configure transfer speed limits to reduce file transfer errors and a network configuration wizard can assist you to configure any confusing network settings.
  • Reduces timeout errors—Filezilla checks your network connection and notifies you if it has been idle for too long by sending a keep-alive command.
  • Multi-language support—Filezilla is currently available in 47 languages worldwide.

Pros

Cons

FileZilla is a reliable, accessible program with many basic functions and advanced tools for expert users. If you are serious about FTP, FileZilla won’t disappoint. FileZilla stores your FTP credential in plain text instead of encrypting it. Therefore the onus is on you and your operating system to protect private data.

Quick Specs

  • Version: 3.9.01
  • File size: 21.6 MB
  • Date added: July 7, 2014
  • Operating systems: Windows, Mac OS X, & Linux.
License: GNU GLPv2

Level: Novice

Donwload LInk:

FilleZilla 3.9.01

sábado, 21 de febrero de 2015

CRYPTOHAZE - GPU accelerated password cracking tools -

A CUDA & OpenCL accelerated rainbow table implementation from the ground up, and a CUDA hash brute forcing tool with support for many hash types including MD5, SHA1, LM, NTLM, and lots more!

Cryptohaze is the home of high performance, open source, network-enabled, US-based cross-platform GPU and OpenCL accelerated password auditing tools for security professionals. Currently, many security professionals are at a serious disadvantage in auditing as they cannot submit hashes to online hash databases due to the terms of their auditing agreement. Cryptohaze tools are aimed at providing high quality tools that run on any platform - Windows, Linux, or OS X. The tools run on all platforms that support CUDA or OpenCL (currently Windows, Linux, OS X). If you don't have a GPU - the OpenCL code will run just fine on your host CPU!

Compatibility

The Cryptohaze tools are designed for both nVidia based graphics cards, and OpenCL devices (nVidia and ATI/AMD graphics cards, and Intel/AMD CPUs). Right now, the old Multiforcer requires CUDA support (so nVidia cards only), but the rainbow table tools and the new Multiforcer work on anything with a CPU, including Atom based devices. For best performance, a top of the line ATI card is recommended. nVidia cards simply do not have the hash performance of ATI right now. The tools do support BFI_INT and other ATI-specific operations to improve performance rather significantly over nVidia cards. That said, if you value your sanity, nVidia may be a better option for these tools. ATI's driver support, especially under Linux, leaves much to be desired and they do not seem to care to fix it. nVidia support is reliable, tested, and is less likely to leave you balding. And the uptime of an nVidia server may compensate for the reduced performance.
OpenCL support is present for the rainbow table tools, and is present in the new alpha Multiforcer. If you are interested in helping to port the tools to OpenCL, drop me a line!

Tools Overview

Cryptohaze Multiforcer
The Cryptohaze Multiforcer is a high performance CUDA password cracker that is designed to target large lists of hashes. Performance holds very solid with large lists, such that on a suitable server, cracking a list of 1 000 000 passwords is not significantly slower than cracking a list of 10. For anyone who deals with large lists of passwords, this is a very useful tool! Algorithm support includes MD5, NTLM, LM, SHA1, and many others.
Multiforcer New (MFN)
The Multiforcer New is a total ground up rewrite of the Cryptohaze Multiforcer with CUDA, OpenCL, and CPU (SSE/AVX/etc) support. It remains focused on brute forcing large hash lists, and scales very well. It also is designed for network clustering of machines - no longer are you limited to running your hashes with a single machine! Other tools have varying levels of network support, but Cryptohaze is the only open source tool with easy to use built in networking.
Cryptohaze GPU Rainbow Tables
There has been very little development in the promising Rainbow Table technology over the past several years. Cryptohaze GPU Rainbow table are a totally fresh implementation of rainbow tables, leveraging the strengths of the nVidia GPUs and OpenCL devices to allow for much larger table spaces and coverage. While the stock RainbowCrack tables use chain lengths of 10 000, the Cryptohaze tables use a chain length of 200 000. This allows much larger attack spaces - NTLM tables for full US charset (95 characters) length 8 are available, and other tables will become available as they are created. While doing this, cracking times on a high performance server remain very reasonable - in some cases, under 2 minutes per password!

License: GNU GLPV2

Level: Expert

Download Link:

Cryptohaze GPU Rainbow Tables

Android Pattern Unlocker

Unlock Samsung Galay Phones.




Description


Tested Devices :
1.Samsung Galaxy Y
2.Samsung Galaxy Y Duos

Procedure :
1.copy both files in root of memory card
2.Insert that memory card in your android device
3.Now switch off your device
4.Now press volume up + power + home button together to start recovery mode
5.In this mode touch will not work so navigate using volume up and down keys and select using home button
6.Now select ‘update zip from sd card’
7.Now select 'cwm.zip'
8.Yellow coloured menu will appear
9.Select ‘install zip from sd card’
10.Then select ‘choose zip from sd card’
11.Select ‘ delete_passward.zip’
12.Now select ‘yes’
13.Then the process will complete after some time
14.Now press back and select ‘Reboot Device’
15.Now Draw Any pattern your device will unlock
16.Now to set new pattern lo

Level: Intermediate

Download Link:

BRUTEFORCER CLIENT

BruteForcer is a client-server multithreaded application for bruteforce cracking passwords. The more clients connected to the server, the faster the cracking.
The client is plugin-based. Meaning that BruteForcer itself is just a segmentation software and it doesn't care what type of file you are trying to crack. It just sends the generated passwords to the plugin and the plugin will handle checking if the password is correct. This concept have a great future potential - any programmer can write a plugin in any language, that can compile stdcall dll-s. And not only for files - this may be adopted to any type of bruteforcing passwords.
At the moment there is only a plugin for RAR archives and only with encrypted filenames. But since this plugin is open source, i hope some people will help with more plugins.

Documentation:

Usage:
Wordlist attack:
Start the server and type the name of the file, that you want to crack. If the file is accessible by all clients on a network you can specify the complete path to it. If it's not, then you have to type the filename with no path and every client will look for it in it's own folder - that means there must be a copy of the file for each client.
Then carefully setup the dictionary. If the password consists of symbols that are not in the dictionary, BruteForcer will not be able to find it. By default in the dictionary there are all lowercase English letters and all numbers. So if you suspect that in the password there might be capital letters or brackets or other symbols you have to add them to the dictionary. But be carefull - the longer the dictionary, the longer the time it takes to break a password.
Then you have to set the maximum password length - the software will not attempt passwords that are longer than this. The default value is 5.
Then start the client on as many machines, as you can find and connect to the server and they will start working.

Since version 0.7 the client supports wordlist attack. Basically when this is enabled it tries to determine if the current combination of symbols mean anything and if it doesn't - then it skips it. For this you need a wordlist file - this is a database with all the words in a language. I have provided an English wordlist with more that 200 000 words. It is easy to make other wordlists from some free spell check libraries.

The wordlist attack operates at 3 different modes:
- Level 1 - It is fastest and skips most of the combinations. It looks only for complete match with the wordlist. It can be useful only if you know that the password is just a single word.
- Level 2 - It ignores the symbols that are not letters, and looks for a match with the wordlist. It is useful when you know that the password is a single word, surrounded by numbers or other symbols.
- Level 3 - It checks if the current combination of symbols contains at least one meaningful word from the wordlist. This is the best mode, i suggest you use it always. The password of the test archive (test.rar) can be found only by this method (or by pure bruteforce of course).

 Level: Expert

Download Link:

Bruteforcer Client

NetworkMiner packet analyzer

NetworkMiner packet analyzer

NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows that can detect the OS, hostname and open ports of network hosts through packet sniffing or by parsing a PCAP file. NetworkMiner can also extract transmitted files from network traffic.




Features


  • Network Forensics
  • Network Sniffing
  • PCAP Parser
  • Digital Forensics
  • Packet Sniffer
Level: Expert

Link to Download:

Networkminer

Process Hacker - View and manage processes, services and more with this powerful tool. -

Process Hacker is a free and open source process viewer. This multi-purpose tool will assist you with debugging, malware detection and system monitoring. It includes powerful process termination, memory viewing/editing and other unique and specialized features.





Features


  • Clear overview of running processes and resource usage
  • Detailed system information and graphs
  • Views and edits services
  • Powerful process termination
  • Bypasses security software and rootkits
  • Other features useful for debugging and analyzing software.
Level: Intermediate

Link to download:

Process Hacker

viernes, 20 de febrero de 2015

Open Stego The Free Steganography Solution


 OpenStego, the free steganography solution. This is an open-source software distributed under the terms of the GNU General Public License v2.0.


OpenStego provides two main functionalities:
  • Data Hiding: It can hide any data within a cover file (e.g. images).
  • Watermarking (beta): Watermarking files (e.g. images) with an invisible signature. It can be used to detect unauthorized file copying.
Support is available through community forums.

What is Steganography?

Steganography is the science of hiding secret message inside another larger and harmless looking message. This is one notch above regular cryptography; which just obscures the original message. Steganography tries to conceal the fact that there is a message in the first place. Steganographic message often appears to be something else than the original (secret) message, like a picture, sound, larger text, etc.
Some terms related to Steganography:
  • plaintext: The original secret message that needs to be communicated.
  • ciphertext: Secret message is often first encrypted using traditional methods. Encrypted message is known as ciphertext.
  • covertext: A larger and harmless looking data which is used as container for the plaintext/ciphertext. This can be a picture, sound, text, etc.
  • stegotext: The data generated after embedding the plaintext/ciphertext into the covertext.
The normal procedure is to first encrypt the plaintext to generate the ciphertext, and then modify the covertext in some way to contain the ciphertext. The generated stegotext is sent over to the intended recepient. If a third party snoops the stegotext in between, then they will just see some harmless looking picture (or sound, etc). Once the recepient receives the stegotext, the ciphertext is extracted from it by reversing the logic that was used to embed it in the first place. The ciphertext is decrypted using the traditional cryptography to get back the original plaintext.

What is Digital Watermarking?

Digital Watermarking is the process of embedding a covert marker in a noise-tolerant signal such as image data. It is typically used to identify ownership of the copyright of such signal. The hidden information should but does not necessarily need to contain a relation to the carrier signal. Digital watermarks may be used to verify the authenticity or integrity of the carrier signal or to show the identity of its owners. It is prominently used for tracing copyright infringements and for banknote authentication. Like traditional watermarks, digital watermarks are only perceptible under certain conditions, i.e. after using some algorithm, and imperceptible anytime else. If a digital watermark distorts the carrier signal in a way that it becomes perceivable, it is of no use.
OpenStego provides robust digital watermarking capabilities such that the watermark strength is not easily reduced when the watermarked image is resized, cropped or some other minor modifications are done.

Level: Expert

Link to Download:

Open Stego

Hide & Reveal steganography software

Hide &Reveal is both an open-source steganography software and a java library distributed under the GNU GPL.
It is primarily designed for scientists wishing to experiment new hiding techniques or steganalysis on various carriers.

Main features

  • Distributed under the GNU General Public License
  • Pure Java
  • Multi-threaded (why? Because it is possible!)
  • Allows to hide any type of file within BMP, PNG and TIF images (more carriers to come...)
  • Hiding and revealing assistants which include automatic hiding scheme selection
  • Uses all schemes (algorithms) provided by the org.steganography library
  • Customizable: pluggable algorithms and carrier types dynamically loaded at execution time (using an XML configuration file validated with XMLSchema)
  • Fully internationalized in english and french. More languages to come depending on contributors
 Level: Expert

 Link Download:


Hide & Reveal steganography


Hide in Picture

Hide in Picture is a program that allows you to conceal files inside bitmap pictures, using a password. The pictures look like normal images, so people will not suspect there is hidden data in them.

Level: Intermediate

Link to Download:
Hide in Picture

Steganos Lock Note


Steganos LockNote will change the way you work with confidential notes. Application and document in one: the mechanism to encrypt and decrypt a note is part of it. Secure, simple, independent. No installation required.
System requirements: Windows 2000, Windows XP, Windows Vista, Windows 7

Why use Steganos LockNote?

  • Store your most valuable notes as a LockNote
    Hide your serial numbers, passwords, phone numbers and everyday notes in a safe place. Your informations will be encrypted using a password and most modern AES 256bit encryption technology.
  • Secure, yet simple
    Just double-click a LockNote and enter your password to access your text files as usual.
  • No installation required
    Move LockNotes wherever you want, as often as you want. A LockNote document does not require much more hard drive space than an unencrypted document.
  • Encrypt existing text files in no time at all
    Simply drag and drop existing text files on a LockNote window: they will be encrypted automatically.
  • Open and free
    LockNote is open source and is based upon open source technologies, e.g. the certified CryptoPP program library for strong encryption.
 Level: Expert

Download Link

Steganos Lock Note

PDF Creator

PDF Creator - Easy to USe

Creating PDF files with PDFCreator is easy. It works as a virtual printer and can convert anything to PDF that you can print. Simply print your document to the PDFCreator printer to start the conversion.

Once you have printed your document, the PDFCreator window will open to allow you to change the title of your document, add metadata (subject, keywords, author name) and select the profile you want to use.
Optionally, you can modify the settings you are using to convert the document. This allows you to control file size and output quality. You can also use advanced features like putting a virtual stamp on the pages or upload the resulting file with FTP.
After hitting save, you can choose the file format and where to store the file.
Your document will be opened afterwards. If you chose to install PDF Architect – our PDF Editor – along with PDFCreator, this will be used to open the files. You can use it to merge this PDF file with other PDFs, rotate and delete pages for free. Optionally, you can buy modules to start editing text, convert PDFs to Word and detect text with our OCR engine.
PDFCreator runs on: WindowsXP SP3, Windows Vista, Windows 7, Windows 8

Level: Novice

Link to download:

Steganography Studio Software


Steganography Studio software is a tool to learn, use and analyze key steganographic algorithms.
It implements several algorithms highly configurable with a variety of filters.
Also implements the best image analysis algorithms for the detection of hidden information.
This software is developed in Java, allowing use in any operating system.




Level: Intermediate

Link to Download: