background preloader

Cyber Security Tools

Facebook Twitter

Become superhuman. People search engines. Reverse IP Lookup - Find Other Web Sites Hosted on a Web Server. Find other sites hosted on a web server by entering a domain or IP address above.

Reverse IP Lookup - Find Other Web Sites Hosted on a Web Server

Note: For those of you interested, as of May 2014, my database has grown to over 100 million domain names. I am now offering this domain list for purchase. A reverse IP domain check takes a domain name or IP address pointing to a web server and searches for other sites known to be hosted on that same web server. Data is gathered from search engine results, which are not guaranteed to be complete. provides interesting visual reverse IP lookup tool. Background All web sites are hosted on web servers, which are computers running specialized software that distribute web content as requested.

As of 2003, more than 87% of all active domains names were found to share their IP addresses (i.e. their web servers) with one or more additional domains. While IP sharing is typically transparent to ordinary users, it may cause complications for both search engine optimization and web site filtering. Solution. Anubis: Analyzing Unknown Binaries. Instant Malware Analysis. Eureka Malware Analysis Page. Wepawet » Home. VirusTotal - Free Online Virus, Malware and URL Scanner. Ethics. Stolen Camera Finder - find your photos, find your camera.

Shellcode_2_exe. Jsunpack - a generic JavaScript unpacker. S malware scan. Multi-Engine Antivirus Scanner - Services - 2013 Cyber Attacks Timeline Master Index. TBN - The Botting Network. Current Cyber Security News * Latest Computer Security News * Information Security.

Intelligence & Security Headlines. Computer Security · News · Opinion · Advice · Research. Fusion Tables. Free online network utilities. Whois Lookup and Domain Search. vURL Online - Quickly and safely dissect malicious or suspect websites.

MX Lookup Tool - Check your DNS MX Records online - MxToolbox. Web page security report. Sandboxie - Sandbox software for application isolation and secure Web browsing. WAVE - Web Accessibility Evaluation Tool. Online Side-Effect Scanner. Online Link Scan - Free Anti-Virus, PageRank, Alexa Rank Check. Free Virus, Trojan, Adware and Malware URL Scanner. Check Browser Compatibility, Cross Platform Browser Test - Browsershots. URL2PNG - Screenshots as a Service. Internet Traffic Archive. The Internet Traffic Archive is a moderated repository to support widespread access to traces of Internet network traffic, sponsored by ACM SIGCOMM.

Internet Traffic Archive

The traces can be used to study network dynamics, usage characteristics, and growth patterns, as well as providing the grist for trace-driven simulations. The archive is also open to programs for reducing raw trace data to more manageable forms, for generating synthetic traces, and for analyzing traces. Traces contributed to the archive have no restrictions as to what use may be made of them (except for traffic analysis as noted below). Traces may however have restrictions on redistribution. Check the Restrictions information associated with the trace. Software contributed to the archive is in general copyrighted. Traces contributed to the archive often will have been filtered to some degree to preserve the privacy of the network users whose traffic was traced, and to address network security concerns.

The 10 Tools of Online Oppressors - Reports. SAN FRANCISCO In reporting news from the world’s most troubled nations, journalists have made a seismic shift this year in their reliance on the Internet and other digital tools.

The 10 Tools of Online Oppressors - Reports

Blogging, video sharing, text messaging, and live-streaming from cellphones brought images of popular unrest from the central square of Cairo and the main boulevard of Tunis to the rest of the world. In Other Languages • Español • Português • Français • Русский • العربية • Multimedia • Audio Report: Offenders and TacticsIn Print • Download the pdfMore on This Issue • CPJ Internet Channel: Danny O'Brien's blog • Blogging in Egypt: Virtual network, virtual oppression • Burmese exile news site endures hacking, DDoS attacks Yet the technology used to report the news has been matched in many ways by the tools used to suppress information.

In two nations we cite, Egypt and Tunisia, the regimes have changed, but their successors have not categorically broken with past repressive practices. Key country: Iran. EnCase 101. A Zero-Day Virus Attack. Earlier this month a part of our University was hit with a zero-day virus attack.

A Zero-Day Virus Attack

I had not heard of the phrase zero-day before now and suspect most people only learn about the concept when one occurs at their place of work. Zero-day refers to a class of computer threats that exposes undisclosed or unpatched application vulnerabilities. Zero-day attacks can be considered extremely dangerous because they take advantage of computer security holes for which no solution is currently available.

Zero-day attacks are difficult to defend against and are often effective against secure networks and can remain undetected even after they are launched. A Zeroday Emergency Response Team (ZERT) is a group of software engineers who works to release non-vendor patches for Zero-day exploits. When the smoke cleared, over 1900 desktops and 10 servers were infected with the mass mailing virus referred to as W32/Nuwar or W32/Mixor. Down for everyone or just me? Thumbalizr - thumb your webpages.

3 status alerts - downrightnow - Check the status of web services and report outages. - test how fast a webpage loads in a real browser from over 50 locations worldwide. Website Screenshot Thumbnail Service. Join the fight against phishing. Hardware Address (MAC Address) Lookup. Freedom Toolbox. Relations & Connections.

People search. Facesaerch - find face pics with this people face search. Web security tools. Website Monitoring Services. Internet Health Report. Hacking.