New Robolinux Cinnamon 9.1 LTE (2021) which runs Windows XP, 7 & 10
Robolinux has been working night and day listening carefully to its User base and is extremely excited to release its brand new Robolinux 64 bit 9 series Cinnamon version which includes automated driver installers, Free Stealth VM, Free C Drive to VM & Free Apps installers, programmable ear candy and much much more built upon the 4.13 Linux kernel sporting the newest Cinnamon version 3.6 This second of five brand new Robolinux 9 series versions focuses on Privacy and was built with a flawless crash free balance of the best current but highly stable Debian & Ubuntu source code, delivering exactly what our Users asked for in a blazing fast Linux OS that runs Windows XP, 7 & 10 natively inside it virus Free. Please see the Readme.txt file for complete Robolinux Cinnamon V9.1 details For all downloads click on the "Files" button above. Thank you John Martinson Founder Robolinux.org
Comprehensive database monitoring solution for SQL Server 2005+
dbWarden is a comprehensive database monitoring and alerting solution for SQL Server 2005. 2008 and now 2012. It features email and text notifications with customizable metrics for alerts such as Blocking, Long Running Queries and SQL Jobs, CPU %, Log file and TempDB growth. Another main feature is a detailed HTML based daily health report which provides a thorough overview of your database server. dbWarden is written completely in SQL and requires sysadmin level permissions to run xp_instance_regread and xp_fixeddrives. Utilizes SQL Agent, DBMail and Operators.
Summary goes here.
Base64 Encoder/Decoder is a tool that allows you to encode/decode in base64. Commonly template designers and authors will encode their copyright footer in to their work to help prevent people from finding and removing it. With this tool you can use it to modify the base64 encoded text. This tool can also create an MD5 hash of ASCII text.
Airfox is a free and fast web browser. It uses the Gecko Engine.
Airfox is a fast, consistent, reliable, secure, private and independent web browser. Developed in the Microsoft .NET Runtime Environment, Airfox uses the Gecko Engine also seen in some well-known browsers such as Firefox, Waterfox, Pale Moon. Some advanced features such as Reliable Download Manager are not available due to restrictions from the GeckoFX runtime, but as seen from the results of the futuremark, acid 3 & acid 2 tests, Airfox’s scores/rankings are merit. We are just asking to support us by downloading Airfox and giving it a try. We promise that V2 will be just as good as the other famous browsers. We just want you to follow us on this journey. We want you to follow us on this quest. The quest for true browsing speed. The quest for an uncluttered web. The quest of YOUR ideal web . Download it at http://www.airfox.sourceforge.net
A header-only C++ library for accessing files in ELF binary format
ELFIO is a header-only C++ library intended for reading and generating files in the ELF binary format
360-FAAR Analyze FW1 Cisco Netscreen Policy Offline Using Config/Logs
360-FAAR (Firewall Analysis Audit and Repair) is an offline, command line, firewall policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in Checkpoint dbedit, Cisco ASA or ScreenOS commands, and its one file! Read Policy and Logs for: Checkpoint FW1 (in odumper.csv / logexport format), Netscreen ScreenOS (in get config / syslog format), Cisco ASA (show run / syslog format), 360-FAAR compares firewall policies and uses CIDR and text filters to split rulebases / policies into target sections and identify connectivity for further analysis. 360-FAAR supports, policy to log association, object translation, rulebase reordering and simplification, rule moves and duplicate matching automatically. Allowing you to move rules to where you need them. Build new rulebases from scratch with a single 'any' rule and log files, with the 'res' and 'name' options. Switch into DROPS mode to analyse drop log entries.
Lock your files and folders .
Simply lock and unlock your files and folders.
IDS + IPS for RouterOS (mikrotik)
This project reads logs from your mikrotik firewall and creates an address list with detected attackers
SIA receiver for Galaxy security control panels.
This project aims to provide a method for listening on a serial port and decode incoming messages from a Galaxy security control panel. The messages are transmitted using the SIA DC-03-1990.01 (R2000.11) protocol. The decoded messages are stored in a database (MySQL) or forwarded by email using ssmtp. Besides just listening for messages openGalaxy can also be used to arm/disarm the panel and much more... This software is still in a testing (beta) phase but has been tested successfully with the following security control panels made by Microtech / Honeywell Security: - Galaxy 18 (Dutch firmware v1.25) with external RS232 box - Galaxy 60 (Dutch firmware v1.07) with external RS232 box - Galaxy G3-520 (Dutch firmware v5.50) (internal RS232)
FireEgl's PuTTY -- FuTTY!
FuTTY is a fork of PuTTY and PuTTYTray.
Chris Root Nuke Killdisk
Written in early 2003 with recent updates is a MS-DOS executable program and disk image that will wipe the MBR record from the master or slave hard disks and has a safety built in to prevent wiping disks when CRN Killdisk hasn't been removed from the boot drive.
Portable, secure and open source AES256 password manager
AES256 Password Manager is a secure, portable and open source password store that uses AES256 encryption. AES256 is a fork of a project originally started by Leprechaun https://github.com/Leproide/CryptStore It's written in .NET but it can be easly be run under OSX or Linux OS using Wine. License: GNU GPL V3
Rescue and clean your hard disk or USB memory, delete broken shortcuts
USBRescuex in its version 2.1 is a computer program category in utility software for files and folders, which its main function is the recovery of hidden files, read-only and corrupted our device (either USB memory devices, removable storage or hard disk). Besides recover those important files for you , eliminates the famous RECYCLER virus , which is the basis of other USB flash drives for viruses , this virus is the main wrongdoer in your USB/Storage Device/Device Storage space Removable memory/disk hard, as the virus will hide all your files and folders , creating false shortcuts and reproducing more viruses to your computer and other USB/removable Devices/Hard Drives storage. The USBRescueX is a lightweight program easy to use and takes up very little space in your computer memory , and is portable version, optimized to run on any windows operating system than Windows XP or higher .
Python Based Brute Force Password Cracking Assistant By Clownsec
A python script used to generate all possible password combinations for cracking WAP and other logins or password files. This program is open source. If you see the need to repair or change something by all means do so, but share your findings. *HONK* Usage: wordpie.py [-h] [-o OUTPUT] [-min MIN_SIZE] [-max MAX_SIZE] [-N] [-L] [-U] [-S] [-A] [-v] Generate a wordlist with all possible combinations of letters including: -L (Lowercase Letters) -U (Uppercase Letters) -N (Numbers) -S (Special Characters) -A (All Characters, Numbers, and Letters) -min (Minimum Size) -max (Maximum Size) -o outputfile.gz or -o stdout By default -o filename.gz to create a GZ compressed text file of all the words. Use the keyword "stdout" to print to screen or for use with other programs like Aircrack-ng or Medusa ./wordpie.py | xargs -L 1 medusa -h 192.168.1.1 -u admin -M web-form -p ./wordpie.py -o stdout -A | aircrack-ng -b XX:XX:XX:XX:XX:XX -w - *.cap
An administrative tool
T RunAs allows you to run a program with administrator rights. it is very useful for administrators who want to grant certain rights for users with no power.
sha3sum - A demonstration of the Keccak permutation.
Hash mode interface to the Keccak code package. This program illustrates the use of the Keccak permutation. Usage is much more than a hash function. The NIST compatible settings are subject to change when they publish FIPS PUB 180-5. I wrote this program when evaluating the permutation and developing tree hashing for the Intel(R) MIC architecture.
A small Programm to generate Secure Passwords, based on an Keyword, the Domain and the Username.
Encrypt plain text with 128-bit AES encryption.
Simple Text Enctyptor v0.13 is a simple program that will encrypt and decrypt text using 128-bit AES encryption.
The Arcanum Editor is a small but powerful tool to encrypt and decrypt messages. The program also comes with it's own format CTXT. This format is based on XML and allows you to save texts with the Advanced Encryption Standard.
CRM114 milter for sendmail
This is a milter which scans emails with CRM114
We moved to GitHub! -> http://luadch.github.io/
We moved to GitHub! New Website: http://luadch.github.io/ There you will find all the necessary informations.
Secure dem messages!
ATTENTION!!!!!! If you downloaded this before 12:12 PM Central Time on April 26, 2015, PLEASE RE-DOWNLOAD!!! A virus had slipped in undetected, and I have DISINFECTED the new copy that has been posted! PLEASE RE-DOWNLOAD IMMEDIATELY!!! That is all. This python program uses a universal key to encrypt and decrypt messages. You can use this program to decode messages made using any other iteration! Output for encoding is called "encrypted_message.axfile" Output for decoding is "decrypted_message.txt"
Simple GPS tracking server
A small server-side application is dedicated to provide TCP-packets response and basic logging functionality from operating low cost commercially available GPS Vehicle Trackers such as Concox GT06N and perhaps others (GT06E and GT06F). The application is using POSIX API and intended to run on Unix, Linux and even Windows systems (cygwin environment). Currently it has been developed and tested on FreeBSD 10.3.
A program to generate random reciprocal bigram tables
A command-line program to encrypt/decrypt a message using a random reciprocal bigram table and write a bigram table to a text file. Executing the program without any command-line arguments starts bigram in message encryption/decryption mode. The program prompts for a password or passphrase and a message to encrypt/ decrypt. After the message is entered the ciphertext is displayed. Executing the program with command-line arguments causes bigram to generate a random bigram table to print to screen or save to disk depending on whether the -f filename argument was given. If the -p passphrase argument is given a specific table is generated and is repeatable each time the same passphrase is given. This program was written to supplement the Enigma Simulator by Dirk Rijmenants. http://users.telenet.be/d.rijmenants/en/enigmasim.htm Enigma message procedures: http://users.telenet.be/d.rijmenants/en/enigmaproc.htm
DAISHO is a Bash Script to Automate MACCHANGER. Daisho Is Designed to work on Unix systems like Ubuntu, Fedora, Back-Track, Red-HAT.