Category: security
By admin on Aug 31, 2014 in open source, security | Comments Off on Open Source Web Security Scanner
IronWASP is an open source web security scanner. It’s Free and Open source GUI based and very easy to use, no security expertise required Powerful and effective scanning engine Supports recording Login sequence Reporting in both HTML and RTF formats – Click here to view the sample report Checks for over 25 different kinds of […]
By admin on Nov 24, 2013 in Java, open source, security | Comments Off on Java–CORS Filter
Cross-origin resource sharing (CORS) is a mechanism that allows JavaScript on a web page to make XMLHttpRequests to another domain, not the domain the JavaScript originated from. Such “cross-domain” requests would otherwise be forbidden by web browsers, per the same origin security policy. eBay CORS filter is a Java Servlet Filter implementation of server-side CORS […]
By admin on Oct 15, 2013 in interesting, security | Comments Off on Tor Open Network
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet, you can check http://www.agenciesranked.com/ where you will find that it is one of top agencies. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for […]
By admin on May 3, 2012 in open source, security | Comments Off on Open Source Web Application Security Audit Tool
ratproxy is a semi-automated, largely passive web application security audit tool, optimized for an accurate and sensitive detection, and automatic annotation, of potential problems and security-relevant design patterns based on the observation of existing, user-initiated traffic in complex web 2.0 environments. If you are building websites, you should definitely get help from this WordPress Website […]
By admin on Mar 31, 2012 in interesting, open source, security | Comments Off on Project Sentry Gun
This project guides you on how to build a sentry gun which autonomously tracks, aims, and shoots at targets, using: An airsoft or paintball gun A webcam to find targets A computer to process the video feed and aim the gun Servo motors to physically aim the gun and squeeze the trigger A sturdy tripod […]
By admin on Aug 8, 2011 in open source, security | Comments Off on Software for Online Anonymity
Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis. Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the U.S. Naval Research Laboratory. […]
By admin on Jul 4, 2011 in open source, security | Comments Off on OWASP Mantra – Security Framework
Mantra is a dream that came true. It is a collection of free and open source tools integrated into a web browser, which can become handy for students, penetration testers, web application developers, security professionals etc. It is portable, ready-to-run, compact and follows the true spirit of free and open source software. Mantra is a […]
By admin on Mar 31, 2011 in security | Comments Off on What Every Web Programmer Needs To Know About Security
Useful reading materials from Google University Part 1 Security Goals Secure Systems Design Secure Design Principles Exercises for Part 1 Part 2 Worms and Other Malware Buffer Overflows Client-State Manipulation SQL Injection Password Security Cross-Domain Security in Web Applications Exercises for Part 2 Part 3 Symmetric Key Cryptography Asymmetric Key Cryptography Key Management & […]
By admin on Oct 18, 2010 in open source, security | Comments Off on Open Vulnerability Assessment System
The Open Vulnerability Assessment System (OpenVAS) is a framework of several services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management solution. The actual security scanner is accompanied with a daily updated feed of Network Vulnerability Tests (NVTs), over 18,000 in total (as of August 2010). All OpenVAS products are Free Software […]
By admin on Aug 13, 2010 in security, windows | Comments Off on Free Rescue Disk from Kaspersky
Boot from the Kaspersky Rescue Disk to scan and remove threats from an infected computer without the risk of infecting other files or computers. Burn this ISO image to a CD, insert it into the infected system’s CD-ROM drive, enter the PC’s BIOS, set it to boot from the CD and reboot the computer. This […]
By admin on Aug 13, 2010 in freebies, security | Comments Off on Free Tool to Wipe Out Hard Disks
Darik’s Boot and Nuke ("DBAN") is a self-contained boot disk that securely wipes the hard disks of most computers. DBAN will automatically and completely delete the contents of any hard disk that it can detect, which makes it an appropriate utility for bulk or emergency data destruction.
By admin on Mar 23, 2010 in open source, security | Comments Off on Open Source Web Security Testing Tool
skipfish is a fully automated, active web application security reconnaissance tool. Key features: High speed: pure C code, highly optimized HTTP handling, minimal CPU footprint – easily achieving 2000 requests per second with responsive targets. Ease of use: heuristics to support a variety of quirky web frameworks and mixed-technology sites, with automatic learning capabilities, on-the-fly […]
By admin on Dec 29, 2009 in open source, security | Comments Off on GSM Sniffer
AirProbe is the new home of the former GSM-Sniffer project. The goal is to build an air-interface analysis tool for the GSM (and possible later 3G) mobile phone standard. The prime motivation is to learn the details of the technology, help people who develop other open GSM technology (like OpenBTS, OpenMoko?, BS11/OpenBSC and others) and […]
By admin on Nov 26, 2009 in security | Comments Off on SQL Injection Tool
SQL Power Injector is an application created in .Net 1.1 that helps the penetration tester to find and exploit SQL injections on a web page. For now it is SQL Server, Oracle, MySQL, Sybase/Adaptive Server and DB2 compliant, but it is possible to use it with any existing DBMS when using the inline injection (Normal […]
By admin on Nov 26, 2009 in security | Comments Off on WEP Attack
WepAttack is a WLAN open source Linux tool for breaking 802.11 WEP keys. This tool is based on an active dictionary attack that tests millions of words to find the right key. Only one packet is required to start an attack. The requirements: The network data has been captured by a WLAN card in monitor […]
By admin on Nov 25, 2009 in network, security | Comments Off on Open Source Wireless Network Sniffer and IDS
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic. Kismet identifies networks by passively collecting packets and detecting standard named networks, detecting (and given time, decloaking) hidden networks, and infering […]
By admin on Nov 20, 2009 in open source, security | Comments Off on Open Source Network Protocol and Application Analyzer
SPIKE When you need to analyze a new network protocol for buffer overflows or similar weaknesses, the SPIKE is the tool of choice for professionals. While it requires a strong knowledge of C to use, it produces results second to none in the field. SPIKE is available for the Linux platform only. SPIKE Proxy Not […]
By admin on Nov 20, 2009 in open source, security | Comments Off on Windows Reverse Engineering Tool
oSpy is a tool which aids in reverse-engineering software running on the Windows platform. With the amount of proprietary systems that exist today (synchronization protocols, instant messaging, etc.), the amount of work required to keep up when developing interoperable solutions will quickly become a big burden when limited to traditional techniques. However, when the sniffing […]
By admin on Nov 20, 2009 in open source, security | Comments Off on Open Source Network Mapping and Monitoring Tool
Cheops-ng is a Network management tool for mapping and monitoring your network. It has host/network discovery functionality as well as OS detection of hosts. Cheops-ng has the ability to probe hosts to see what services they are running. On some services, cheops-ng is actually able to see what program is running for a service and […]
By admin on Nov 20, 2009 in security | Comments Off on Port Scanner for Windows
ScanLine is a command-line port scanner for all Windows platforms. It can perform traditional ICMP "pinging", optional additional ICMP TimeStamp scanning, can show host response times and number of hops, do TCP scanning, simple UDP scanning, banner grabbing and hostname resolving. Scanning is performed in a fast highly parallel fashion without resorting to using multiple […]