The Powerful Protection for PC Against Viruses from Removable Drives
Shiela USB Shield is a powerful first line defense against virus from infected removable drives. * It locks autorun.inf and associate executable files in multiple instance * Delete/Freeze the shortcut file or clone file, and restores the original automatically. * It is free and open source. System Requirements 1) Windows 2000 or later 2) 256Mb RAM or higher 3) 1GHz Processor or faster 4) .NET Framework 2.0 or later must be installed
a deliberately vulnerable Web application
This is Vulnerable Web Application developed for course by Cyber Security and Privacy Foundation (www.cysecurity.org) for Java programmers The full course on Hacking and Securing Web Java Programs is available in https://www.udemy.com/hacking-securing-java-web-programming/ WAR file: ---------- https://sourceforge.net/projects/javavulnerablelab/files/latest/JavaVulnerableLab.war/download Virtualbox VM file: -------------------------- http://sourceforge.net/projects/javavulnerablelab/files/v0.1/JavaVulnerableLab.ova/download Credentials for the VM: ------------------------ Username: root Password: cspf Stand-alone file: (Run the Jar file directly) -------------- http://sourceforge.net/projects/javavulnerablelab/files/v0.2/JavaVulnerableLab.jar/download
Encrypt your text files with XOR cipher
This is a windows standalone application. Encrypt your text(.txt) files with XOR cipher . A new version with a better UI and bug fixes is available http://sourceforge.net/projects/xorencrypt2/
IT security resources for ethical hacking & penetration testing
this collection of most used resources that will help you in ethical hacking and penetration testing. Collection of hacking tools and materials and all major type of attacks and tutorials.
Paranoia Text Encryption mantiene SMS, correos, mensajes de redes sociales, notas y cualquier otro texto a salvo de ladrones, hackers y fisgones. Basta con pegar texto copiado desde cualquier aplicación, o guardarlo en un archivo para usarlo más adelante. Paranoia Text Encryption keeps SMS, mails, messages from social networks, notes and any other text safe from thieves, hackers and snoopers. Simply paste text copied from any application, or save it in a file, use it more later
Head of five afficertificates for astercertifications and repairs.
_Astercertifications1212 personal registry, 03April2015 at: SourceForge.net; it is a communicant project type, on english language which, built-in Pass Over, for hypertransport connectivity. The objectives from this project are, the core astercertifications from six documents versus a identity theft11 by the Insurdaerrorism666; assisting online under Cordenated Application about. Astercertificate6-00-1212 and the Five Afficertificates5468 are ready logos and registered trade mark from: F. C. C. name integrity 2015; all rights reserved. Security issues from this project are the Sure Socked Liability applied to Cordined Application; all weather anywhere with non 'against parties' but, with his respective priorities. This project is addressed temporary under claims at: http://Astercertificate6251212.sf.net {Trusted Origens} ©Frank A. Nassau III; Apr.03/2015; all rights reserved. |Privacy Policy6251212|, |Warning DC VAP|
MBar Shutdown Manager is a free and opensource shutdown software.
MBar Shutdown Manager is a free and opensource shutdown software. If you are downloading a torrent or a big file and need to shutdown your PC at a specific time, MBar Shutdown Manager is your best pick! It doesn't require high level computer knowledge and is very easy to use. REQUIRES .NET FRAMEWORK 2.0 or HIGHER!
WebApp Pentest Tool
This is an Alpha version of what is to become an all in one tool for pentesting of web applications. In its current phase it currently scans google dorks and tests for sql vulnerabilities. Once urls are harvested from google dorks they are saved to a log file for future reference. One a sql check is run, the vulnerable URLs are saved to a seperate log file. View the readme in /docs for more information.