background preloader

BackBox Linux

BackBox Linux

Related:  Hacking Tools / Downloads / Scripts & CodesTools: Security - Forensics - Pentesting - Ethical Hacking

Essential Wireless Hacking Tools By Daniel V. Hoffman, CISSP, CWNA, CEH Anyone interested in gaining a deeper knowledge of wireless security and exploiting vulnerabilities will need a good set of base tools with which to work. Autopsy Forensic Easy to Use Autopsy was designed to be intuitive out of the box. Installation is easy and wizards guide you through every step. The War On Cyber CyberTerrorists - The War On Cyber: CyberTerrorists - The War On Cyber Join us now to get access to all our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, and so, so much more. Subscribe to topics and forums to get automatic updates Welcome to CyberTerrorists - The War On Cyber, like most online communities you must register to view or post in our community, but don't worry this is a simple free process that requires minimal information. Take advantage of it immediately, Register Now or Sign In .

Cheat Engine Features[edit] Cheat Engine can inject code into other processes and as such most anti-virus programs mistake it for a virus. There are versions that avoid this false identification at the cost of many features (those which rely upon code injection). The most common reason for these false identifications is that Cheat Engine makes use of some techniques also used in trojan rootkits to gain access to parts of the system, and therefore gets flagged as suspicious, especially if heuristic scanning is enabled in the anti-virus program's settings. Newer versions of Cheat Engine are less likely to be blocked by anti-virus programs so features like code injection can be used without problems. Implementations[edit]

OWASP Developer Guide. OWASP Developer Guide The OWASP Developer Guide 2014 is a dramatic re-write of one of OWASP's first and most downloaded projects. The focus moves from countermeasures and weaknesses to secure software engineering. XBMCbuntu XBMCbuntu is a boot-USB drive/LiveCD image with XBMC pre-configured to work directly out-of-the-box for a dedicated set-top-box style installation of XBMC. Users can either demo XBMC without touching the internal HDD, or use it to install XBMCbuntu on the HDD, without any pre-installed operating systems. XBMCbuntu is based on a light weight version of Ubuntu.

Jpg+FileBinder Free Download Protecting private information against unauthorized access is one of the problems that computer users encounter. In order to solve this issue, you can use various encryption methods, but there are also applications such as Jpg+FileBinder that can help you. This lightweight tool is simple, yet useful, as it allows you to hide important information in a picture carrier file. Practically, it merges an archive file with a picture, making the output look like an image, when actually it contains the compressed file.

Qubes Qubes is an open-source operating system designed to provide strong security for desktop computing. Qubes is based on Xen, the X Window System, and Linux, and can run most Linux applications and utilize most of the Linux drivers. Qubes Release 1 was released in September 2012. Qubes Release 2 is almost complete, with rc1 having been released in April 2014. Qubes supports Windows-based AppVMs beginning with Release 2. Hidden iframe injection attacks [Updated on October 27, 2009 with new a version of the script] It is a shame that after all those posts about security, some of my websites were under attack today. Shoban and Anand emailed me about this today morning (Thanks guys) and I tried to understand what was going on. To my utter disbelief more than 10 websites hosted in the same server were affected by the attack. All the index.* files in the server were infected with a piece of code that loaded a hidden iframe in the page. To the html pages the following piece of code was added:

Top 15 Open Source. Free Security. Tools. 1. Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap homepage. 2.

Ubuntu Logiciels Espions: Que faire? - Free Software Foundation - Travailler ensemble pour le logiciel libre Proprietary software is associated with malicious treatment of the user: surveillance code, digital handcuffs (DRM or Digital Restrictions Management) to restrict users, and back doors that can do nasty things under remote control. Programs that do any of these things are malware and should be treated as such. Widely used examples include Windows, the iThings, and the Amazon "Kindle" product for virtual book burning, which do all three; Macintosh and the Playstation III which impose DRM; most portable phones, which do spying and have back doors; Adobe Flash Player, which does spying and enforces DRM; and plenty of apps for iThings and Android, which are guilty of one or more of these nasty practices. Free software gives users a chance to protect themselves from malicious software behaviors.

ActiveTcl is Tcl for Windows, Mac, Linux, AIX, HP-UX & Solaris ActiveTcl Business and Enterprise Editions include our precompiled, supported, quality-assured Tcl distribution used by millions of developers around the world for easy Tcl installation and quality-assured code. When you're using Tcl on production servers or mission-critical applications, ActiveTcl Business Edition and Enterprise Editions offer significant time savings over open source Tcl for installing, removing, upgrading, and managing common Tcl modules. Not sure which edition is right for you?

National Cyber Awareness System Four products in the National Cyber Awareness System offer a variety of information for users with varied technical expertise. Those with more technical interest can read the Alerts, Current Activity, or Bulletins. Users looking for more general-interest pieces can read the Tips. Current ActivityProvides up-to-date information about high-impact types of security activity affecting the community at large.AlertsProvide timely information about current security issues, vulnerabilities, and exploits.BulletinsProvide weekly summaries of new vulnerabilities. Patch information is provided when available.TipsProvide advice about common security issues for the general public.

ActivePerl is Perl for Windows, Mac, Linux, AIX, HP-UX & Solaris ActivePerl Business and Enterprise Editions feature our precompiled, supported, quality-assured Perl distribution used by millions of developers around the world for easy Perl installation and quality-assured code. When you're using Perl on production servers or mission-critical applications, ActivePerl Business and Enterprise Editions offer significant time savings over open source Perl for installing, managing, and standardizing your Perl . If you are using ActivePerl for production, redistribution, on terminal servers, for thin client for app deployment (i.e. on MS Terminal Services, Citrix XenApp or File Servers), or for use on HP-UX/AIX/Solaris then ActivePerl Community Edition is not the right license for you.

Related:  benny519