... neuere Einträge
Friday, 4. May 2012
MOBILedit - Forensic
Am Friday, 4. May 2012 im Topic 'Forensic'
MOBILedit! Forensic is the world's most trusted phone investigation tool. Highly rated by the National Institute of Standards and Technology, MOBILedit! Forensic is the primary mobile device investigation tool used in over 70 countries. Simply connect a phone and MOBILedit! Forensic extracts all content and generates a forensic report ready for courtroom presentation. These tamper-proof, flawless reports are used in hundreds of courtrooms every day.
Download
http://www.mobiledit.com/downloads.htm?show=8
Download
http://www.mobiledit.com/downloads.htm?show=8
Revelo – Javascript Deobfuscator
Am Friday, 4. May 2012 im Topic 'Tutorials'
While this tool does have some protections built into it, it may execute malicious code that could harm your computer so use it in a virtual machine. It’s been tested to run on Windows XP. There’s a helper document inside the zip file which includes safe samples to play with.
Features:
* Analyze a script quickly by loading a file or pasting in Javascript code
* Includes several methods to deobfuscate Javascript
* Includes a built-in browser proxy which displays the URL of outgoing requests
* Displays the Document Object Model (DOM) elements
* Includes a packet sniffer which logs incoming and outgoing requests
* Includes a software firewall to prevent the program from accessing Internet content accidentally
* Ability to act as a web proxy to catch and block redirects
* Beautifies Javascript code to make it more readable
* Ability to clear the browser cookies
* Ability to spoof the user-agent string
Download
http://www.mediafire.com/?6rdb8bwjo9jdylj
by
darryl
Features:
* Analyze a script quickly by loading a file or pasting in Javascript code
* Includes several methods to deobfuscate Javascript
* Includes a built-in browser proxy which displays the URL of outgoing requests
* Displays the Document Object Model (DOM) elements
* Includes a packet sniffer which logs incoming and outgoing requests
* Includes a software firewall to prevent the program from accessing Internet content accidentally
* Ability to act as a web proxy to catch and block redirects
* Beautifies Javascript code to make it more readable
* Ability to clear the browser cookies
* Ability to spoof the user-agent string
Download
http://www.mediafire.com/?6rdb8bwjo9jdylj
by
darryl
HackBar 1.6.1 - Add-on
Am Friday, 4. May 2012 im Topic 'Pentest'
This toolbar will help you in testing sql injections, XSS holes and site security. It is NOT a tool for executing standard exploits and it will NOT teach you how to hack a site. Its main purpose is to help a developer do security audits on his code. If you know what your doing, this toolbar will help you do it faster.
Download
https://addons.mozilla.org/en-US/firefox/addon/hackbar/
"
# Load url ( alt a )
This loads the url of the current page into the textarea.
# Split url ( alt s )
When this button is clicked, the url/text in the textarea will be split into multiple lines using the ? and & character
# Execute ( alt x, ctrl enter )
This will execute the current url in the textarea, i mostly use ctrl+enter
# INT -1 ( alt - )
First select a number in the textarea and press this button, the number will be lowered by 1 and the url will be loaded.
# INT +1 ( alt + )
Again first select a number in the textarea and press this button, 1 will be added to the number and the url will be loaded.
# HEX -1 ( control alt - )
First select a number in the textarea and press this button, the number will be lowered by 1 and the url will be loaded.
# HEX +1 ( control alt + )
Again first select a number in the textarea and press this button, 1 will be added to the number and the url will be loaded.
# MD5 Hash ( alt m )
this is a standard hashing method, often used as an encryption method for passwords. It will MD5 hash the currently selected string.
# SHA-1/256
this is a standard hashing method, often used as an encryption method for passwords. It will SHA-1/256 hash the currently selected string.
# MySQL CHAR() ( alt y )
If quotes are escaped but you did find an SQL injection thats exploitable, you can use this button to convert lets say:
load_file('/etc/passwd') --> load_file(CHAR(47, 101, 116, 99, 47, 112, 97, 115, 115, 119, 100))
Thus omiting the use of quotes to load a file.
You can also use this on
WHERE foo LIKE ('%bar%') --> WHERE foo LIKE (CHAR(37, 98, 97, 114, 37))
# MsSQL CHAR() ( alt q )
Same story as MySQL CHAR(), MsSQL has a slightly different CHAR syntax
--> WHERE foo LIKE ( CHAR(37) + CHAR(98) + CHAR(97) + CHAR(114) + CHAR(37))
# Base64 encode / decode
Base64 encoding ( UU ) is often used to store data (like a return url etc.) This will help you to read those values.
# URLencode / decode
This will encode or decode the currently selected characters to url safe characters. I mostly use it to end a query with # (%23) when in a pseudo path where i cant use /* or
"
by
amarjit
Download
https://addons.mozilla.org/en-US/firefox/addon/hackbar/
"
# Load url ( alt a )
This loads the url of the current page into the textarea.
# Split url ( alt s )
When this button is clicked, the url/text in the textarea will be split into multiple lines using the ? and & character
# Execute ( alt x, ctrl enter )
This will execute the current url in the textarea, i mostly use ctrl+enter
# INT -1 ( alt - )
First select a number in the textarea and press this button, the number will be lowered by 1 and the url will be loaded.
# INT +1 ( alt + )
Again first select a number in the textarea and press this button, 1 will be added to the number and the url will be loaded.
# HEX -1 ( control alt - )
First select a number in the textarea and press this button, the number will be lowered by 1 and the url will be loaded.
# HEX +1 ( control alt + )
Again first select a number in the textarea and press this button, 1 will be added to the number and the url will be loaded.
# MD5 Hash ( alt m )
this is a standard hashing method, often used as an encryption method for passwords. It will MD5 hash the currently selected string.
# SHA-1/256
this is a standard hashing method, often used as an encryption method for passwords. It will SHA-1/256 hash the currently selected string.
# MySQL CHAR() ( alt y )
If quotes are escaped but you did find an SQL injection thats exploitable, you can use this button to convert lets say:
load_file('/etc/passwd') --> load_file(CHAR(47, 101, 116, 99, 47, 112, 97, 115, 115, 119, 100))
Thus omiting the use of quotes to load a file.
You can also use this on
WHERE foo LIKE ('%bar%') --> WHERE foo LIKE (CHAR(37, 98, 97, 114, 37))
# MsSQL CHAR() ( alt q )
Same story as MySQL CHAR(), MsSQL has a slightly different CHAR syntax
--> WHERE foo LIKE ( CHAR(37) + CHAR(98) + CHAR(97) + CHAR(114) + CHAR(37))
# Base64 encode / decode
Base64 encoding ( UU ) is often used to store data (like a return url etc.) This will help you to read those values.
# URLencode / decode
This will encode or decode the currently selected characters to url safe characters. I mostly use it to end a query with # (%23) when in a pseudo path where i cant use /* or
"
by
amarjit
Trend Micro Titanium Antivirus Plus 2012 - free
Am Friday, 4. May 2012 im Topic 'Malware Search'
Strong, fast and easy-to-use security– Trend Micro Titanium Antivirus Plus 2012 provides essential protection so you can email and surf the web hassle free. Titanium uses cloud technology to proactively stop viruses and spyware before they reach your computer, so it won’t slow you down. It’s the same technology we use to protect some of the world’s biggest businesses, now available to you.
Download
https://store.trendmicro-europe.com/store?Action=buy&Currency=GBP&Locale=en_GB&OfferID=12254304609&Pgm=78737900&SiteID=tmoemem&ThemeID=1283700&productID=239744300&quantity=1&resid=T6N2IQoHAtQAADi4MNIAAAAR&rests=1336112673668
Download
https://store.trendmicro-europe.com/store?Action=buy&Currency=GBP&Locale=en_GB&OfferID=12254304609&Pgm=78737900&SiteID=tmoemem&ThemeID=1283700&productID=239744300&quantity=1&resid=T6N2IQoHAtQAADi4MNIAAAAR&rests=1336112673668
ZoneAlarm Internet Security 2013 - free
Am Friday, 4. May 2012 im Topic 'Malware Search'
ZoneAlarm has two-way firewall that operates quietly in the background, monitoring incoming and outgoing traffic to and from a PC and the Internet. It blocks hackers from getting into a PC and stops them from launching attacks, stealing information, and sending data back to their home servers to conduct malicious activities.
ZoneAlarm comes with a powerful antivirus engine scan which detects, and removes any malicious programs. To further insulate a user’s system, ZoneAlarm’s OSFirewall adds an additional layer of protection by spotting and stopping any suspicious behavior and new attacks.
Download
http://download.zonealarm.com/bin/free/1001_za/zaSetupWeb_102_047_000.exe
ZoneAlarm comes with a powerful antivirus engine scan which detects, and removes any malicious programs. To further insulate a user’s system, ZoneAlarm’s OSFirewall adds an additional layer of protection by spotting and stopping any suspicious behavior and new attacks.
Download
http://download.zonealarm.com/bin/free/1001_za/zaSetupWeb_102_047_000.exe
... ältere Einträge