a suite for man in the middle attacks on LAN. It features sniffing of live connections, content filtering on the fly and many other interesting tricks.
an Open Source (free) tool that allows you to have a different password for all the different programs and websites that you deal with, without actually having to remember all those usernames and passwords. (an alternative to KeepPass if needed)
page will generate a HTML encoded mailto link that is reasonably 'spambot' proof. Spambots crawl over websites looking for email addresses, when they find one they add it to their database for junk email.
an open source framework for applications that intercept ntercepts ( JDBC )and optionally modify database statements. For JBoss, ATG, Orion, JOnAS, iPlanet, WebLogic, WebSphere, Resin and Tomcat.
a collection of utilities and technical information related to Windows internals by Mark Russinovich and Bryce Cogswell. Microsoft acquired Sysinternals in July, 2006.
web server scanner which performs comprehensive tests against web servers for multiple items, including over 3300 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are
Disposable temporary e-mail address which expire after 15 minutes. You can read and reply to e-mails that are sent to the temporary e-mail address within the given time frame.
social bookmarks manager; allows you to easily add sites you like to your personal collection of links, to categorize those sites with keywords, and to share your collection not only between your own browsers, but also with others.
a software framework that allows for advanced sequence and protocol stream analysis by utilizing bioinformatics algorithms. The sole purpose of this software is to identify protocol fields in unknown or poorly documented network protocol formats.
project is about concealing valuables, secrets in our workplaces. Here, hidden spaces/ messages were created within 8 general objects such as wood boards, lamps and disposable coffee cups.
by Huw Collingbourne. Covers a range of important topics from virus prevention to unauthorized data access. If you want to protect yourselves from the bad guys
a service that analyzes suspicious files and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware detected by antivirus engines.
"locks down" an operating system, proactively configuring the system for increased security and decreasing its susceptibility to compromise. Bastille can also assess a system's current state of hardening, granularly reporting on each of the security setti
The numbers that control your life. You're identified by dozens of numbers. Your phone number, your driver's license number, your social security number, your zip code, your license plate, your credit card numbers. I find these numbers fascinating. Who distributes them? What can they be used for? How can you use them? How are they issued?
an interactive HTTP/S proxy server for attacking and debugging web-enabled applications. It operates as a man-in-the-middle between the end browser and the target web server, and allows the user to intercept, inspect and modify the raw
(TrashReg) is an advanced Registry cleaning tool. The main function of RTKF is to allow the removal of unnecessary keys from the Windows Registry. Many programs leave keys in the Registry, even after programs removal...
(Mostly HP JetDirects, but a little info on the Ricoh Savins), This article will attempt to point out some of the more interesting things that can be done with a network based printer to make it reveal information about its users, owners and the network i
comprehensive, modular and portable cryptographic toolkit that provides developers with a vast array of well known published block ciphers, one-way hash functions, chaining modes, pseudo-random number generators, public key cryptography and a plethora of