Announcing two new faster Robolinux 9.2 versions which run Windows
Robolinux is very pleased to announce its newly upgraded Cinnamon & Mate 3D 9.2 LTE 2021 versions release. The main focus on this massive upgrade was to improve speed, security and stability. Both of our 9.2 Versions come with FREE expert Tech Support. They have newer kernels, the newest VirtualBox and a significant number of important upstream security updates. The Robolinux 9.2 versions include many more automated driver installers, Free Stealth VM, Free C Drive to VM & Free Apps installers, and much much more. The Robolinux 9.2 versions focus on Privacy delivering exactly what our Users want which is a blazing fast Linux OS that runs Windows XP, 7 & 10 natively inside it. Please see the Readme.txt file for complete Robolinux V9.2 details For all downloads click on the "Files" button above. Thank you John Martinson Founder Robolinux.org
The best open system for Your business
Open source is for everyone and so is YetiForce. You can use it for free in every type of organizations and companies of all sizes. Organize your whole business by managing it within one system, not a thousand others. Customize it in the way that suits you and your business best. Try YetiForce CRM and let that love for open source never do you apart again. Downloaded over 250 000 times all over the world. Where else can you find us? https://github.com/YetiForceCompany/YetiForceCRM/releases http://www.softaculous.com/apps/erp/YetiForce https://www.linkedin.com/company/10867904 https://github.com/YetiForceCompany/YetiForcePortal Testing versions: GitStable: https://gitstable.yetiforce.com GitDeveloper: https://gitdeveloper.yetiforce.com YetiPortal: https://gitdeveloper.yetiforce.com/portal
Free Syslog Server for Windows with a graphical user interface
Visual Syslog Server for Windows is a free open source program to receive and view syslog messages. Useful when setting up routers and systems based on Unix/Linux. Visual Syslog Server for Windows has a live messages view: switches to a new received message. Helpful color highlighting. Useful message filtering. Customizable notification and actions. Sources hosted on the GitHub: https://github.com/MaxBelkov/visualsyslog
A fast, secure, stable web browser powered by Chromium and Trident.
Polarity is a dual engine browser powered by both Chromium and Trident that focuses on system efficiency by bringing low RAM and low CPU usage. This browser was also programmed to be optimized for Windows with an Android version available. Browse the web with an uncomplicated UI that is highly customizable with themes, apps, and extensions from the Polarity Store, GreasyFork, OpenUserJS, and UserStyles. Polarity also comes with a built in password manager which safely encrypts all data to prevent theft. Polarity also comes with a built in adblocker and privacy tools such as proxy/VPN support and header masking to prevent further tracking online. If you appreciate all the hard work that we put into creating and developing Polarity, please consider giving a small donation at: http://polarityweb.weebly.com/donate.html
Arbitrary-precision CRC calculator and algorithm finder
CRC RevEng is a portable, arbitrary-precision CRC calculator and algorithm finder. It calculates CRCs using any of the 102 preset algorithms, or a user-specified algorithm to any width. It calculates reversed CRCs to give the bit pattern that produces a desired forward CRC. CRC RevEng also reverse-engineers any CRC algorithm from sufficient correctly formatted message-CRC pairs and optional known parameters. It comprises powerful input interpretation options. Compliant with Ross Williams' Rocksoft(tm) model of parametrised CRC algorithms.
MitM pentesting opensource toolkit
Operative Systems Suported are: Linux-ubuntu, kali-linux, backtack-linux (un-continued), freeBSD, Mac osx (un-continued) Netool its a toolkit written using 'bash, python, ruby' that allows you to automate frameworks like Nmap, Driftnet, Sslstrip, Metasploit and Ettercap MitM attacks. this toolkit makes it easy tasks such as SNIFFING tcp/udp traffic, Man-In-The-Middle attacks, SSL-sniff, DNS-spoofing, D0S attacks in wan/lan networks, TCP/UDP packet manipulation using etter-filters, and gives you the ability to capture pictures of target webbrowser surfing (driftnet), also uses macchanger to decoy scans changing the mac address. Rootsector module allows you to automate some attacks over DNS_SPOOF + MitM (phishing - social engineering) using metasploit, apache2 and ettercap frameworks. Like the generation of payloads, shellcode, backdoors delivered using dns_spoof and MitM method to redirect a target to your phishing webpage. recent as introducted the scanner inurlbr (by cleiton)
Mail Alert Simple Mailer
Mail Alert Simple Mailer is a simple command-line utility designed for IT administrators for sending e-mail from Microsoft Windows OS. It can be executed from command line, Windows batch file or PowerShell scripts. My main reason for writing this software was to handle events generated by Dell OpenManage Server Administrator (OMSA), APC PowerChute and Windows Events to send hardware status and alerts like temperature alerts, UPS battery status, powerline status and RAID controller alerts from monitoring software. It can be used with any other software where you can configure external application to be executed when specific event occurs. Mail Alert Simple Mailer supports SSL and STARTTLS protocols, so it is compatible with many free e-mail providers like GMail, Hotmail, etc. Unlike other simple command line tools it supports ISO-8859-1, ISO-8859-2 and UTF-8 code pages for national characters. Mail Alert Simple Mailer encrypts SMTP password in configuration file.
Airfox is a free and fast web browser. It uses the Gecko Engine.
Airfox is a fast, consistent, reliable, secure, private and independent web browser. Developed in the Microsoft .NET Runtime Environment, Airfox uses the Gecko Engine also seen in some well-known browsers such as Firefox, Waterfox, Pale Moon. Some advanced features such as Reliable Download Manager are not available due to restrictions from the GeckoFX runtime, but as seen from the results of the futuremark, acid 3 & acid 2 tests, Airfox’s scores/rankings are merit. We are just asking to support us by downloading Airfox and giving it a try. We promise that V2 will be just as good as the other famous browsers. We just want you to follow us on this journey. We want you to follow us on this quest. The quest for true browsing speed. The quest for an uncluttered web. The quest of YOUR ideal web . Download it at http://www.airfox.sourceforge.net
Fake command prompt to fool tech support scammers
For instructions on how to use, see this file: https://sourceforge.net/projects/techsupportcmd/files/How%20To%20Use.pdf/download This fake command prompt can be used instead of the real windows command prompt in order to waste the tech support scammers time. It is based upon the windows 7 command prompt, but is not noticeably different from the command prompt in most other windows versions. Many commands commonly used by scammers, such as tree, netstat and powercfg are emulated in this, but they provide results that the scammer would not be expecting, for example, the tree command draws an ASCII tree, while the powercfg command comes back with no errors, no warnings and no informational - every time, without fail. Commands not included all come back with the usual error as displayed for invalid commands in the real command prompt, however other commands can be added.
TraceMAC is a command-line Layer 2 traceroute for Cisco switches
TraceMAC is a Windows/Linux command-line tool that allows you to trace a specific MAC address thru Cisco switches. It works by connecting to a switch using SSH, SNMP, Telnet, HTTP or HTTPS and do some "show commands" and later process the output, this will happen recursively until it finds the switch where that MAC address (PC/Printer/Etc) is directly connected. Note: It works with Cisco switches only and you must have CDP enabled at least on trunks/links between switches! Tested with Cisco SW: 2960, 3560, 3750, 4948, 6509, Express 500
Tyrant SQL is a Havij based cross-platform. It's Sqlmap's gui version.
It's a poweful Sql Injection Tool. It's a GUI version of SqlMap, saving time and getting better results. Was designed basing on Havij.
A multi-platform universal log collector and forwarder
NXLog is a modular, multi-threaded, high-performance log management solution with multi-platform support. In concept it is similar to syslog-ng or rsyslog but is not limited to unix/syslog only. It can collect logs from files in various formats, receive logs from the network remotely over UDP, TCP or TLS/SSL . It supports platform specific sources such as the Windows Eventlog, Linux kernel logs, Android logs, local syslog etc. Writing and reading logs to/from databases is also supported. The collected logs can be stored into files, databases or forwarded to a remote log server using various protocols. The old BSD Syslog and the newer IETF syslog standard is fully supported by NXLog in addition to Snare, XML, JSON, GELF, KVP, CSV and custom formats. A key concept in NXLog is to be able to handle and preserve structured logs. No need to convert everything to syslog and parse these logs again at the other side. It has powerful message filtering, log rewrite and conversion capabilities.
A push-button wireless hacking and Man-in-the-Middle attack toolkit
This project is designed to run on Embedded ARM platforms (specifically v6 and RaspberryPi but I'm working on more). It provides users with automated wireless attack tools that air paired with man-in-the-middle tools to effectively and silently attack wireless clients. Some of the tools included in the kit are: Custom regex-based DNS Server DHCP Aircrack-ng suite Browser Exploitation Framework (Preconfigured for metasploit) Metasploit Python-based Transparent Injection Proxy Pushbutton configuration "Limpet Mine" mode for attacking existing networks You basically answer three questions in the start script, wait a bit, then log into the BEEF console to start attacking clients
Add LDAP user authentication in MySQL
mysql auth_ldap is an authentication plugin for the MySQL server. It allows you to create SQL users that are going to be authenticated using a LDAP server. This allows to minimize administrative duties, since your users will be able to reuse their existing account to access the database. The plugin requires MySQL 5.5.7 and up. It is compiled as an add on and does not require you to alter MySQL source code, or recompile the entire server. The plugin add support for LDAP using the openLDAP library.
ClamSAP exists of two 'C' shared libraries which link between ClamAV and the Virus Scan Interface (VSI) of SAP (offical name: NW-VSI). A SAP application can use the ClamAV engine to scan for malicious uploads in HTTP uploads for example.
List Processes, Services & Drivers
View & Manage Windows Processes, Services & Drivers
The Polybius Square Encipher/Decipher Square 5x5, Removed Letter: 'W'
Python package that allow you to encipher a plaintext, decipher a ciphertext, using The Polybius Square cryptography.
Portable, secure and open source AES256 password manager
AES256 Password Manager is a secure, portable and open source password store that uses AES256 encryption. AES256 is a fork of a project originally started by Leprechaun https://github.com/Leproide/CryptStore It's written in .NET but it can be easly be run under OSX or Linux OS using Wine. License: GNU GPL V3
Network Transformation Manager for IP network evolution
netTransformer is a conceptual software prototype of a network transformation manager able to: - Discover current network infrastructure - Capture its state - Build a graph data model out of it - Provide ability to review and reason about L2, L3, OSPF, ISIS and BGP topology - Automate device configuration process through simplified template interface! - Track the network evolution process - Transform a network from one state to the other
Commands made Easy and practical for Unix/Linux
This software is made with the purpose of making easy the Unix/Linux Server management. Is made completly in Python, making this project as a OS independent. Was tested over Linux and Windows. For documentation go to http://www.life-microsystems.com/index.php/ecommands-documentation
A console-mode program that will keep all your passwords safe
PasswordBox is a console-mode program that will keep all your passwords safe, in an encrypted database protected by a master password. PasswordBox can also be used to generate secure (random) passwords. This program is written by Mateusz Viste, and uses the AES implementation of Chris Brown to handle all encryption/decryption processes. PasswordBox is available for the following operating systems: DOS, Windows, Linux. Remember, that if you forget your master password, you will have no way to recover the database content. Usage: pbox [--help] [--dump] --help displays a help screen (any unsupported parameter will display it, too) --dump lists all the data of your encrypted database onscreen
Windows Cleanup and Optimization Tool
Simple and powerful, REBEL is a free and open source application designed to clean and optimize your Windows computer. REBEL does this by clearing system caches, deleting temporary files, and performing system health checks using data collected in real-time from the Web.
Secure dem messages!
ATTENTION!!!!!! If you downloaded this before 12:12 PM Central Time on April 26, 2015, PLEASE RE-DOWNLOAD!!! A virus had slipped in undetected, and I have DISINFECTED the new copy that has been posted! PLEASE RE-DOWNLOAD IMMEDIATELY!!! That is all. This python program uses a universal key to encrypt and decrypt messages. You can use this program to decode messages made using any other iteration! Output for encoding is called "encrypted_message.axfile" Output for decoding is "decrypted_message.txt"
Internet BGP Peering Topology Map
bgpPeeringMap is a product able to discover and visualize BGP Peering topology by SNMP polling of BGP enabled routers. Once the polling process finish the network engineers are able to reason about the BGP peering topology, to obtain additional information about certain AS (Autonomous System) from RIPE or ARIN to draw shortest paths between two ASes and to locate an IP address on the map. Youtube channel http://www.youtube.com/channel/UCVrXTSM9Hj6d3OFbIdF4Z2w
jEncrypt is a command line file encryption archiver
jEncrypt is a command line file encryption archiver designed to help you encrypt files and directories into a single file archive.