An alternative to ClamWin
ClamAV-Suite is a gui for ClamAV developed for Windows 10 (x64 only). ClamAV-Suite allows to scan your device in three different ways: -fast scan -full scan -custom scan For other information see documentation. Who wants to contribute write me to: dntpanic[at]users[dot]sourceforge[dot]net
A free Password Generator written in Java
next version is 2.4.6
This project aims at developing a easy software for the protection of SCP-ECG files and also control the access to the protected files.
An open source browser with antivirus, system cleaning, file folder locking, social networking, movie viewing, chatting and parental website block features.
Whonix is an Anonymous Operating System.
THIS IS NOT WHONIX'S HOMEPAGE. Please go to: https://www.whonix.org/ (This is only Whonix's sourceforge must-have project page.) Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP. Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call Whonix-Gateway. The other, which we call Whonix-Workstation, is on a completely isolated network. Only connections through Tor are possible. Whonix is produced independently of, and carries no guarantee from, The Tor Project. For download: https://www.whonix.org/wiki/Download
Multi hash crack suite
This script is capable of cracking multiple hashes from a CSV-file like e.g. dumps from sqlmap. Over 17.000 md5-hashes in a CSV-file get cracked with a 14.300.000 lines wordlist in less then 1 min. Lines wich cant get cracked with the wordlist get stored in a .leftToCrack-File to further process with another Wordlist or the bruteforce-tool. In addition to the wordlist-cracker I created also a bruteforce-tool named CSVHashBrutforcer.
Finds all the security information for a given domain name
Domain analyzer is a security analysis tool which automatically discovers and reports information about the given domain. Its main purpose is to analyze domains in an unattended way.
eSCAPe (Enhanced SCAP Editor) is used to create Security Content Automation Protocol (SCAP) content files, in particular OVAL & XCCDF files. Allows experts to create SCAP content without requiring in-depth knowledge of the protocols themselves.
Perform automated MITM (Man In The Middle) attacks.
ENGLISH: Jack the Stripper uses iptables, Ettercap and SSLStrip to intercept data between two connected targets (IP addresses). The victims's ARP tables must be poisoned by Ettercap, that means Jack the Stripper works only on local networks. PORTUGUÊS: Jack The Stripper utiliza iptables, Ettercap e SSLStrip para interceptar dados entre dois alvos (endereços IP) interconectados. As tabelas ARP das vítimas devem ser envenenadas pelo Ettercap, isso significa que Jack The Stripper funciona apenas em redes locais.
Performs 256-bit symmetric-key encryption using established algorithms
Qana is a Java application that encrypts files, text and archives (hierarchically structured sets of files) with a symmetric-key cipher based on established cryptographic algorithms: the scrypt key derivation function and the Fortuna cryptographically secure pseudo-random number generator, with a choice of AES-256 or Salsa20 as the underlying cipher. * It has an easy-to-use graphical interface, including a straightforward key-management dialog. * Individual files can be encrypted. * Text can be edited and encrypted. The encrypted text can be optionally wrapped in XML. * A hierarchical set of files can be encrypted as an archive, which is stored as a set of encrypted files with generic names, along with an encrypted file of metadata. * A single file can be split into several encrypted parts. * Files or text can be encrypted and concealed within an image file. * A file, text or image can be generated with the same form as an encrypted output but containing garbage.
Rose Crypt provides users with a simplistic application that can be used for encrypting files in your computer using a custom passphrase. With its minimal design, Rose Crypt can be used by both advanced and beginner users. Once the encryption process is finished, you can access the newly created file from the location you previously selected.
A VM for using Tor
Preconfigured Debian Virtual Machine for use with Tor. Features: - Newest available tor version. - Iptables-script for tunneling all traffic through Tor. - Preconfigured MATE desktop environment.
An ncurses based password database client that is compatible with KeePass 1.x format databases.
ConvertShellcode takes Shellcode as input and disassemble it in a list of instructions in assembly language. This is a CLI tool. Supported formats: - "\xEB\x08\xBA\x4D\x11\x86\x7C\xFF\xD2\xCC\xE8\xF3\xFF\xFF\xFF\x63" - "%uc92b%ue983%ud9eb%ud9ee%u2474%u5bf4%u7381%u1313%u2989" - "%40%6E%40%6E%40%6E%40%6E%40%6E%40%6E%40%6E%40%6E%97%6E%40" - "%u9090" - "\u9090" - "邐" Also take a look at: - https://zeltser.com/convert-shellcode-to-assembly - http://www.aldeid.com/wiki/ConvertShellcode
Universal password generator. This program generates password for each account you want from hostname, username and one global password (passkey, master password, skeleton key). So you need to remember only one password.
Pwnie Express Pwn Plug Elite image for stock Sheevaplugs
Utility for embedding hidden data into PNG files
A simple pack of security softwares such as Folder Hidder, Encryption.
Tiny Security Suite is a simple collection of portable security tools that are essentials. It consist of Clamwin Antivrius, PAPI Firewall, and the developer own Folder Hidder (like IOBit Protected Folder), AES File encryption and a simple file shredder. Note, this release is still under beta version, so use it at your own risk. The goal of this project is to create lightweight, simple to use but useful security softwares. All softwares, except Clamwin antivirus and PAPI Firewall and the icons (from wikimedia), are licensed under GNU LGPL license.
A program to en/decrypt texts that are only crackable using bruteforce
codeZ is a program that can encrypt/decrypt texts that are not crackable without using brute-force attacks. It supports loads of characters, including symbols like brackets.
Simple password manager in Russian
Simple password manager that uses encryption AES 256. Translated into Russian. AES256 Password Manager (originally Encrypter) decoder is a text file that stores the passwords or other sensitive data is completely secure manner using encryption algorithm AES 256-bit. Official page http://xn--90abhbolvbbfgb9aje4m.xn--p1ai/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%BF%D0%B0%D1%80%D0%BE%D0%BB%D0%B8/aes256-password-manager-%D0%BF%D1%80%D0%BE%D1%81%D1%82%D0%BE%D0%B9-%D0%BC%D0%B5%D0%BD%D0%B5%D0%B4%D0%B6%D0%B5%D1%80-%D0%BF%D0%B0%D1%80%D0%BE%D0%BB%D0%B5%D0%B9.html Autor twitter: https://twitter.com/mrkaban546
A file integrity checker. Similar to hashdeep but in a GUI.
DeepDigest is a file integrity checker. It calculates hash values for selected files and allows the files to be verified against those values. Its GUI interface provides several features not found in similar programs. Roughly speaking, DeepDigest is a GUI version of md5deep/sha1deep/sha256deep. To use DeepDigest, a user first creates a "job". This specifies the directory to be hashed and the hash algorithm to be used (MD5, SHA-1 or SHA-256). The results of a job run are saved to an archive file. Subsequent runs of the job are compared to this archive to determine which files have changed. New, deleted, renamed or moved files are also reported. The results view may be sorted, filtered and searched. Results may be exported in csv format or to another installation of DeepDigest. DeepDigest may be run from the command line and from scripts. The name of the job to be run is passed as a command line argument. DeepDigest is written in C++ and uses the Qt libraries.
Sistema de gestión para pruebas de penetración, ofrece una plataforma para ejecutar herramientas de línea de comandos, salvar resultados en una base de datos, realizar búsquedas usando expresiones regulares, impresion de informes y mucho mas.
Process Memory Dumper it's developed for IT Consultants IT Security Consultants that need to dump the entire memory of a process and/or save informations about all running processes and modules. It's developed in C++ using MFC
Easy to use parental control
Restrict Application is powerful parental control software that can easily block adult content or any other site, game or software. Restrict Application can be set to update it's configuration from remote server allowing to update configuration simultaneously on large number of computers. This software has also built-in remote control which can be used to pause or turn off this software from other computer.
SES brings back the uncrackable onetime pad, with a digital twist.
SES brings back the uncrackable onetime pad, with a digital twist. It is well known that a random key of message-length is the only provably unbreakable cipher. SES uses cryptographic strength pseudo-random keys of message-length for its many encipherments, in addition to offering true one-time pad capability for the intrepid. SES is built on ISAAC, Bob Jenkins' unbroken CSPRNG, a fast and simple stream cipher placed in the Public Domain in 1996. SES now gives you the ability to efficiently cipher text of arbitrary length or files of any size or type. Use it with confidence. To achieve complete one-on-one privacy, SES traverses several levels en route to its output. The more words in your key-phrase, the more layers of encipherment SES applies. It is part Vigenere, part onetime pad, part cryptographic hash, not to mention the essential scrambler element, each component driven by ISAAC, with all key-derivation and stretching relying on Keccak in 512-bit configuration.