Wednesday, 18. April 2012
codepad
codepad is an online compiler/interpreter, and a simple collaboration tool.
Paste your code below, and codepad will run it and give you a short URL you can use to share it in chat or email.

Info
http://codepad.org/

Permalink

 


List of websites checker
1.MyWot:
WOT is a community-based, free safe surfing tool for browsers that provides website ratings & reviews to help web users as they search, surf & shop online.

website: www.mywot.com

2.VirusTotal:
VirusTotal is a free virus, malware and URL online scanning service. File checking is done with more than 40 antivirus solutions.

website: www.virustotal.com

3.Norton Safe Web, from Symantec
Look up website safety information and safe site rankings from Norton Safe Web from Symantec. Read what others think and write your site reviews.

website: safeweb.norton.com

4. Unmask Parasites
Free online website security service. Check your web pages for hidden illicit content (invisible spam links, iframes, malicious scripts and redirects).

website: www.unmaskparasites.com/

5. Google Diagnostic:
checks whether site hosts malware or not.

website: http://google.com/safebrowsing/diagnostic?site=target.com

6.Online Link Scan
Online Link Scan collects and summarizes the threat reports of the aforementioned Phishtank, AVG and Google Safe Browsing engines.

website: onlinelinkscan.com

by
EHN Reporter

Permalink

 


Binary File Converter
Binary File Converter
It converts a binary file into text which shows up in the text box which you can copy/paste over to a receiving program which converts text back into a binary file.

Download
http://www.mediafire.com/?zdb2pli66vw9gs7

by
darryl

Permalink

 


theharvester - Information Gathering
TheHarvester is a tool for gathering e-mail accounts, user names and hostnames/subdomains from different public sources like search engines and PGP key servers
cd /pentest/enumeration/theharvester
./theHarvester.py -d google.com -l 500 -b google
./theHarvester.py -d yoursite.com -l 500 -b google

Download
https://code.google.com/p/theharvester/downloads/list

Permalink

 


HITB Magazine Issue 008 April
Contents:
FEATURED ARTICLE: Online Security at the Crossroads
NETWORK SECURITY: The Exploit Distribution Mechanism in Browser Exploit Packs and Reverse Shell Traffic Obfuscation
WINDOWS SECURITY: The Story of CVE-2011-2018 exploitation
CISSP ® CORNER: Jobs and Certifications Looking at the 2012 Landscape
FROM THE BOOKSHELF: Practical Malware Analysis and The Tangled Web
BOOK REVIEW: A Bug Hunter’s Diary

Download PDF
http://magazine.hitb.org/issues/HITB-Ezine-Issue-008.pdf

Permalink

 


Ra.2 - xss-scanner
Ra.2 is basically a lighweight Mozilla Firefox Add-on that uses a very simple yet effective and unique approach to detect most DOM-based XSS vulnerabilities, if not all. Well it needs to work on it’s speed but tools great.

Download
http://code.google.com/p/ra2-dom-xss-scanner/downloads/list

Permalink

 


Thursday, 12. April 2012
Sophos Virus Removal Tool
Removes viruses, spyware, rootkits and fake antivirus
100% free! Totally, absolutely, completely
Supports Windows XP, Vista and 7
Works alongside your existing antivirus

Download
http://www.sophos.com/en-us/products/free-tools/virus-removal-tool/download-now.aspx

Permalink

 


joomla (com_estateagent) - SQL
Exploit Title: joomla component (com_estateagent) SQL injection Vulnerability
Date: 10/04/2012
Author: xDarkSton3x
Category:: webapps
Google dork: inurl:"com_estateagent"

Permalink

 


Metasploit & Firefox Fake Extension (XPI)
This exploit dynamically creates a .xpi addon file. The resulting bootstrapped Firefox addon is presented to the victim via a web page with. The victim's Firefox browser will pop a dialog asking if they trust the addon. Once the user clicks "install", the addon is installed and executes the payload with full user permissions. As of Firefox 4, this will work without a restart as the addon is marked to be "bootstrapped". As the addon will execute the payload after each Firefox restart, an option can be given to automatically uninstall the addon once the payload has been executed.

Permalink

 


InsidePro Password Recovery Software
• SAMInside is a professional solution for the recovery of user passwords used to log on to Windows NT, Windows 2000, Windows XP, Windows 2003, Windows Vista and Windows 7. The software is one of the the world's fastest in terms of search speed; it features over 10 ways of importing hashes, does not require installation, supports several types of attacks and recovery of passwords in a variety of encodings; plus, offers auxiliary tools for extracting and handling hashes.

• PasswordsPro is a professional solution for the recovery of passwords from hashes of the following types: Blowfish, DES, MySQL, MD2, MD4, MD5, MD5(Unix), MD5(phpBB3), MD5(Wordpress), MSSQL, NTLM, HAS-160, SHA-1, SSHA-1, SHA-256, SHA-384, SHA-512, SHA-256(Unix), SHA-512(Unix), Domain Cached Credentials, Haval-128/160/192/224/256, RipeMD-128/160/256/320, Tiger-128/160/192, GOST R 34.11-94, Snefru-128/256, Whirlpool and many others. This is the world's only program that supports over 180 hash types! The software has an open API, which allows customizing the solution by adding any hash algorithm to it. It has a friendly interface, does not require installation, implements several types of attacks and has lots of options to make the recovery of passwords from hashes flexible and efficient. The software supports external plug-ins, which you can use to considerably expand its capabilities; more than 10 ready-to-use plug-ins with a variety of useful functions for handling hashes, passwords and dictionaries are built in.

• Extreme GPU Bruteforcer is a professional solution for the recovery of passwords from hashes using GPU. The software supports hashes of the following types: MySQL, DES, MD4, MD5, MD5(Unix), MD5(phpBB3), MD5(Wordpress), NTLM, Domain Cached Credentials, SHA-1, SHA-256, SHA-384, SHA-512 and many others. On modern graphics cards from NVIDIA that support the CUDA technology, the software demonstrates outstanding operation speed. For example, an average attack speed on NVIDIA GTS250 is 420 million passwords per second for MD5 hashes, 700 million passwords per second for MySQL hashes and 550 million passwords per second for NTLM hashes. The software implements several unique attacks, including mask and hybrid dictionary attacks, which allow recovering even the strongest passwords incredibly fast. Utilizing the power of multiple graphics cards running simultaneously (supports up to 32 GPU), the software allows reaching incredible search speeds of billions of passwords per second!

Info
http://www.insidepro.com/

Permalink

 


CRUNCH TV SHOW - I'm curious
This is the new trailer for the new Crunch TV Security Show with startup in may 2012.
The first moderator of the security tv show is the well known John Thomas Draper alias Captain Crunch.
Co-moderator & researcher of the show is the well known exploiter Benjamin Kunz Mejri from Germany.


Permalink

 


Tuesday, 10. April 2012
CIntruder - bypass captchas - Linux
CIntruder is a pentesting tool written in python, to launch brute force attacks against captchas and try to bypass them.

Dowload
http://sourceforge.net/projects/cintruder/files/cintruder_v0.1.0.tar.gz/download

Permalink

 


WhatWeb - Linux
WhatWeb identifies websites. Its goal is to answer the question, "What is that Website?". WhatWeb recognises web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1000 plugins, each to recognise something different. WhatWeb also identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more.

Download
http://www.morningstarsecurity.com/downloads/whatweb-0.4.7.tar.gz

Permalink

 


Sunday, 8. April 2012
Magix Xtreme Foto & Grafik Designer 5.1 - Happy Easter
A graphic software such as Photo & Graphic Designer is usually included in photo editing programs using multiple toolbars. The toolbar on the left side is the most important, for it determines which step will take place next. Here you will find an entire tool palette, from a simple cursor in the top corner (selection tool) to the photo tool (marked by a red cross) at the bottom left, which will be mentioned again later. To use these, you will first need a photo. After it has been archived on the PC, a photo may be uploaded directly from the program or placed into the program via drag-and-drop. The portrait, which serves as an example here, has been imported into the software in horizontal format. It may now be turned by hand into the desired position, for which you must left click once on the image with your mouse. Since the portrait has to be turned 90 degrees, there is another perfectly suitable function which may be used. Rotate left and rotate right are tools, appearing in the top toolbar after the photo tool is selected in the right toolbar.

Download
http://dl.cdn.chip.de/downloads/14931645/Xtreme_Foto_Grafik_Designer_5_DLM_chip_DE.exe?1333901261-1333908761-431de1-B-8d8f4eeeb1d5d631d0805c4bb825ff4b.exe

Permalink

 


Iphone runtastic Roadbike - Happy Easter
runtastic Roadbike is your comprehensive bike app for your smartphone. The integration of heart rate, cadence, and speed sensors lets you get more precise tracking and analysis of your biking.

Download
http://clk.tradedoubler.com/click?p=23761&a=411323&url=http%3A%2F%2Fitunes.apple.com%2Fde%2Fapp%2Froad-bike-pro-fahrrad-computer%2Fid468429333%3Fmt%3D8%26uo%3D4%26partnerId%3D2003

Permalink

 


Mercury - Android
Mercury is a framework that provides interactive tools that allow for dynamic interactions with the target applications running on a device. It is a free and open source framework for bug hunters to find vulnerabilities, write proof-of-concept exploits and play in Android. It also provides a platform for effective vulnerability hunting and exploitation on the Android operating system. Mercury was basically created to meet the need for a consolidated testing framework for Android.

Download
http://labs.mwrinfosecurity.com/tools/2012/03/16/mercury/downloads/

Permalink

 


Friday, 6. April 2012
Steganos Privacy Suite 2012 - Happy Easter
Safes: Locks and encrypts documents, photos and your e-mail post office in a virtual data safe. Secures USB sticks, CDs and DVDs when on the go.
Password Manager: Organizes and manages all of your passwords and access information. All securely encrypted, of course. Supports Drag and Drop, or fills out website forms automatically.
Shredder: Shreds unwanted data permanently—cannot be reconstructed by data recovery applications.
Plus: E-mail and web favorites encryption functions, trace destructor and Steganography.

Complement your firewall and antivirus software with a first-rate data protection and encryption system.

Download
http://dl.cdn.chip.de/downloads/14931568/sss12int_chip.exe?1333709164-1333716664-27dc9c-B-5247026e20ae20194b36eb3572a13ccb.exe

Permalink

 


TuneUp Utilities - Happy Easter
TuneUp Utilities 2011 is one of the most popular system utility suites for windows that optimizes the performance of your system, repairs problems, and helps you to customize the look of your system. Some of the key troubleshooting tasks performed by the app include repairing the windows registry, checking hard drive for errors, disabling startup entries, and stopping unused services or processes.

Info
http://www.tune-up.com/promo/pcf0512/

Permalink

 


Malware Classifier
Malware Classifier is an open-source tool which can be downloaded for free from SourceForge. In order to run the tool you will also need to download Python, Python pefile and in case you need to support Python < 2.7 you will also need Python argparse . For higher Python versions, the argparse module is part of the Python standard library.

Download
http://sourceforge.net/projects/malclassifier.adobe/files/

Permalink

 


siteinspector.comodo
SiteInspector allows website owners to choose 3 pages on a domain that they want to monitor. If malware is discovered or if the website is found on any one of a range of website blacklisting services, then the account owner is immediately notified via email.

Info
http://siteinspector.comodo.com/

Permalink