Friday, 2. March 2012
Ocster Backup Pro 7
Ocster Backup Pro is a fully automatic backup solution that supports full PC backup (image backup), file backup, email backup (Outlook, Thunderbird), browser backup (Firefox, Chrome, Internet Explorer), contacts backup. The application is very easy-to-use and includes wizard that guides users with no knowledge or new to backup programs to perform the desired tasks effectively. Backup performed by Ocster Backup pro can be stored on local drives, removable drives or on secure Ocster backup servers.

Info:
Visit promo page
https://www.ocster.com/unlock/obp7/en?edt=cbde11a
Enter your details
You will receive a confirmation mail

Permalink

 


Thursday, 1. March 2012
Windows 8 Preview - ISO-Images
Download ISO-Images
Englisch

64-Bit (x64) (3,1 GB) Sha 1 Hash – 1288519C5035BCAC83CBFA23A33038CCF5522749
http://iso.esd.microsoft.com/WCPDL/BD1B8A49393E30CC9C4E5C88457D73E964F1F3B18/Windows8-ConsumerPreview-64bit-English.iso

32-Bit (x86) (2,3 GB) Sha 1 Mash – E91ED665B01A46F4344C36D9D88C8BF78E9A1B39
http://iso.esd.microsoft.com/WCPDL/BD1B8A49393E30CC9C4E5C88457D73E964F1F3B18/Windows8-ConsumerPreview-32bit-English.iso

Product Key: DNJXJ-7XBW8-2378T-X22TX-BKG7J


Permalink

 


Wednesday, 29. February 2012
sslyze - SSL Scanner - Linux
Cross-platform tool to analyze the configuration of SSL servers.
Supports cipher suites scanning, insecure renegotiation verification, session resumption testing, client certificates, and more...
Tested on Python 2.6 & 2.7, and Ubuntu and Windows 7, both 32 and 64 bits. Based on OpenSSL and a custom Python wrapper.
Contact: sslyze /at/ isecpartners \dot\ com


Download
http://code.google.com/p/sslyze/downloads/list

Permalink

 


mimikatz - Recover Passwords
Tool To Recover Cleartext Passwords From Lsass. It was possible to recover the cleartext passwords of logged on windows users.

Download
http://blog.gentilkiwi.com/downloads/mimikatz_trunk.7z
http://blog.gentilkiwi.com/downloads/mimikatz_trunk.zip

Permalink

 


Saturday, 25. February 2012
SIPVicious tool suite
SIPVicious suite is a set of tools that can be used to audit SIP based VoIP systems. It currently consists of four tools:

svmap - this is a sip scanner. Lists SIP devices found on an IP range
svwar - identifies active extensions on a PBX
svcrack - an online password cracker for SIP PBX
svreport - manages sessions and exports reports to various formats
svcrash - attempts to stop unauthorized svwar and svcrack scans

Download
http://code.google.com/p/sipvicious/downloads/list

Permalink

 


PacketFence - network access control system - Linux
The PacketFence development team has published version 3.2.0 of its open source network access control (NAC) system. PacketFence allows organisations to increase control over their network by enforcing authentication and registration for newly connected devices. It also enables abnormal network activity detection and the isolation of troublesome devices.

Download
http://www.packetfence.org/download/releases.html

Permalink

 


Thursday, 23. February 2012
Mirage Anti-Bot
Jean-Pierre aka DarkCoderSc and Fred De Vries Develop and Release the second version of Another great security tool named "Mirage Anti-Bot 2.0". Zeus and SpyEye were the two main families of botnet software. These types of malware are spread mainly through drive-by downloads and phishing schemes.

Download
http://unremote.org/downloads/Mirage2/Setup.exe

Permalink

 


Patator - brute-forcing tool - Linux
Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.

Currently it supports the following modules:
* ftp_login : Brute-force FTP
* ssh_login : Brute-force SSH
* telnet_login : Brute-force Telnet
* smtp_login : Brute-force SMTP
* smtp_vrfy : Enumerate valid users using the SMTP VRFY command
* smtp_rcpt : Enumerate valid users using the SMTP RCPT TO command
* http_fuzz : Brute-force HTTP/HTTPS
* pop_passd : Brute-force poppassd (not POP3)
* ldap_login : Brute-force LDAP
* smb_login : Brute-force SMB
* mssql_login : Brute-force MSSQL
* oracle_login : Brute-force Oracle
* mysql_login : Brute-force MySQL
* pgsql_login : Brute-force PostgreSQL
* vnc_login : Brute-force VNC
* dns_forward : Forward lookup subdomains
* dns_reverse : Reverse lookup subnets
* snmp_login : Brute-force SNMPv1/2 and SNMPv3
* unzip_pass : Brute-force the password of encrypted ZIP files
* keystore_pass : Brute-force the password of Java keystore files

Download
http://code.google.com/p/patator/downloads/list

Permalink

 


Saturday, 18. February 2012
What Is A Rootkit?
At the core of the term "rootkit" are two words- "root" and "kit". Root refers to the all-powerful, "Administrator" account on Unix and Linux systems, and kit refers to a set of programs or utilities that allow someone to maintain root-level access to a computer. However, one other aspect of a rootkit, beyond maintaining root-level access, is that the presence of the rootkit should be undetectable.

Dowload BootRoot
http://www.eeye.com/Resources/Security-Center/Research/Tools/BootRoot

Download Jynx
http://www.blackhatacademy.org/security101/index.php?title=Jynx

Permalink

 


Intersect 2.0 - Post Exploitation Automation - Linux
Intersect 2.0 is a Python script written to perform automated Post-Exploitation information gathering and reporting.
The general idea is that after you have exploited a target, you run this script and it performs a variety of tasks
that you would normally need to perform manually. Intersect will collect password files, copy SSH keys, enumerate
processes and installed applications, gather detailed network information, map the hosts internal network (for pivoting),
locate and identify common anti-virus and firewall applications and much more.

Download
https://github.com/ohdae/Intersect-2.0/

Permalink