Attacker
The purpose of PvLog LicenseManagerKiller is to warn against the inefficiency of managing licenses in 100% managed code. LicenseManagerKiller is a tool that removes LicenseProvider attributes in the assembly. This tool is rudimentary and releases only most naive protections, but you can imagine...
Platforms: Windows
License: Freeware | Size: 382 KB | Download (49): PvLog LicenseManagerKiller 64-bit x64 Download |
Durak (Fool) limits the number of players to 6. The deck of 36 cards is shuffled, and each player receives 6 cards. The top card on the remaining deck is made visible and placed at the bottom of the deck across it (so that its denomination is seen). This determines the trump suit and the revealed...
Platforms: Windows
License: Freeware | Size: 442 KB | Download (466): Durak Download |
Open XML Converter allows you to convert Open XML files that were created in Office 2008 for Mac or Office 2007 for Windows so that you can open, edit, and save them in earlier versions of Office for Mac. Open XML Converter can convert Word documents, Excel workbooks, and PowerPoint presentations...
Platforms: Mac
License: Freeware | Size: 44.7 MB | Download (62): Microsoft Office Open XML Converter Download |
Doorman is a password generator. Features Generate Ramdom Password If you want Doorman to generate a random password you can define the length and select the characters that should be used. You can choose between letters in lower and upper case, numbers and special characters. Speakable...
Platforms: Windows, Mac, *nix, C/C++, BSD Solaris
License: Freeware | Download (53): Doorman Download |
PHPIDS (PHP-Intrusion Detection System) is a simple to use, well structured, fast and state-of-the-art security layer for your PHP based web application. The IDS neither strips, sanitizes nor filters any malicious input, it simply recognizes when an attacker tries to break your site and reacts in...
Platforms: Windows, *nix, PHP, BSD Solaris
License: Freeware | Download (52): php4ids Download |
Yavipind is a secure tunnel aka 2 peers securely forwarding packets toward each other. It forwards any kind of packet (IPv4, IPv6 or other) sent over the virtual point-to-point device (e.g. tun0). It fully runs in linux userspace. Features:Network efficiency: - small packet overhead: 26bytes...
Platforms: *nix, C/C++, BSD
License: Freeware | Download (57): Yavipind Download |
Stores password hashes securely. The default password hashes are insecure - MD5 is easy to crack, should an attacker find a database dump or gain access to your database. This module implements secure password hashes using the phpass password hashing method - multiple rounds of hashing and...
Platforms: PHP
License: Freeware | Size: 10 KB | Download (39): Secure Password Hashes (phpass) Download |
#D7CX I pledge that 443 Session will have a full Drupal 7 release on the day that Drupal 7 is released.Inspired by a blog post on Cracking Drupal: Drupal and SSL - Multiple Recipes to Possible Solutions, This project is for sites that use mixed security, or HTTPS for some pages and HTTP for the...
Platforms: PHP
License: Freeware | Size: 10 KB | Download (41): 443 Session Download |
Easily fetch your esub nym messages from the alt.anonymous.messages newsgroup aamFetch is a free and open source utility for fetching your anonymous esub nym messages from the alt.anonymous.messages newsgroup (or other newsgroups). Sometimes you get into situations where it is helpful to write...
Platforms: Mac
License: Freeware | Size: 870.4 KB | Download (47): aamFetch Download |
The Breaking the AES Cipher Model encrypts a plaintext message using AES encryption and attempts to break this encryption using a plaintext attack. The attacker (Eve) obtains both the plaintext and the cyphered text for a message between two people, Alice and Bob, and systematically encrypts the...
Platforms: Mac
License: Freeware | Size: 911.36 KB | Download (40): Breaking AES Encryption Model Download |
JHoney is a honeypot tool for Linux written in Java. A honeypot is a system or service that looks vulnerable to the Internet. The purpose is to trick hackers to attack the honeypot system, and the honeypot could then take countermeasures against the attacker. JHoney simulates network services by...
Platforms: *nix
License: Freeware | Size: 51.2 KB | Download (41): JHoney Download |
Daemon Shield finds IPs of crackers and kiddies attempting to break in. It creates iptables rules to block attackers' IPs for a specified period of time. Features Creates iptables log & reject rules against attacker's IPs. Background daemon continuously watches logfiles for activity. Logs...
Platforms: *nix
License: Freeware | Size: 40.96 KB | Download (33): Daemon Shield Download |
SQLI - use GOOGLE dorks list to find vulnerable web sites which are then injected with data to dump the databases contents so you can view it. SQL injection is a code injection technique, used to attack data-driven applications, in which nefarious SQL statements are inserted into an entry field...
Platforms: Windows, Windows 8, Windows 7, Windows Server
License: Freeware | Size: 1.92 MB | Download (81): SQLi Download |