Jump to content

Versus71

Active Members
  • Posts

    110
  • Joined

  • Last visited

  • Days Won

    5

Everything posted by Versus71

  1. Versus71

    PwnedList

    PwnedList actively protects you by continually monitoring sites that host stolen credentials and other security data. If your data has been compromised we’ll notify you immediately—but that’s not all. You can check your online accounts and know with virtual certainty whether they’ve been compromised at any time. 267,834,011 account credentials harvested 4,529 leaks discovered 1,184,569,888 passwords collected 475,834,011 email addresses found Link: https://pwnedlist.com
  2. Malicious URL Shortener + HTML5 DDoS PoC This project demonstrates the serious consequences of the Internet's increased reliance upon URL shortners, as well as how easy it is to create an unwitting DDoS botnet using new HTML5 features without actually exploiting a single computer. It is intended only for demonstration and testing purposes; if you target a site that is not yours, you are responsible for the consequences. Download: http://d0z-me.googlecode.com/files/d0z-me-0.2.tar.gz
  3. Versus71

    DomainsDB

    Reverse IP & NS Lookup Tool. This service gives more results than other similar services. Link: DOMAINSDB.NET - Reverse IP & NS Lookup Tool
  4. Online Link Checkers Sucuri SiteCheck Sucuri SiteCheck - Free Website Malware Scanner Unmask Parasites Website Security Check - Unmask Parasites
  5. Eraser is an advanced security tool for Windows which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. There are several problems in secure file removal, mostly caused by the use of write cache, construction of the hard disk and the use of data encoding. These problems have been taken into consideration when Eraser was designed, and because of this intuitive design and a simple user interface, you can safely and easily erase private data from your hard drive. Download: Download Eraser from SourceForge.net Gutmann method: Gutmann method - Wikipedia, the free encyclopedia
  6. Product Key Finder is a free Windows key finder applications that retrieves license key information (CD Keys) from the Windows registry. Product Key Finder currently supports retrieval of 200+ licenses from applications such Microsoft Windows, Microsoft Office and Adobe Acrobat. Download: http://davehope.co.uk/Projects/CPP-ProductKeyFinder.exe
  7. Versus71

    Regex101

    Regex101.com is a free of charge regex testing service where you can easily create expressions while you simultaneously have real time error detection, highlighting and explanation of your regex. Thanks to the permalink feature, it is a great reference which may even be used in code where you need to explain your regular expressions to co-workers. Link: regex101.com
  8. Some free: Drupal Security Scan Joomla Security Scan WordPress Security Scan
  9. A script to work with many types of shells madShell. When adding a shell automatically checks availability and ability to execute shell commands. Now all the commands are executed by POST. In Shell List sorting it is possible to the parameters. Requires PHP + MySQL. Modes: Shell List Stats Add shells Command Execution Logs Automatically determines parameters such as: Safe Mode Platform Version Country Download: http://dl.dropbox.com/u/49340709/t00lz/madShellC0ntr01_v1.2.rar
  10. Database changes monitor SQLWatch 4.0 - tool for monitoring and profiling SQL queries in application on JDBC Driver layer. Currenly supported JDBC Drivers: MySQL - direct supported Other (including MySQL) - supported through log4jdbc driver proxy Profiling: How many times same data is selected from database per operation? How long it take to perform all SQL queries per operation? Is SQL queries efficient? SQLWatch-QueriesProfiler: listens all SQL queries from JDBC driver and aggregates them. Whan no queries is received within 5 sec (configurable) then queries statistics is printed to stdout. Download: http://sqlwatch.googlecode.com/files/sqlwatch-4.0-preview-v1.zip http://sqlwatch.googlecode.com/files/sqlwatch3.0.0.jar
  11. I tried to download an archive larger than 3GB. MEGA reduces the speed.
  12. Get immediate online access to open source vulnerability scanning tools for testing of web applications, Internet servers and IP networks. In addition to the selection of vulnerability scanners we also have Free access to a number of IP Tools that can be used for troubleshooting, research and information gathering when conducting a security assessment. Nmap Online Port Scanner OpenVas Vulnerability Scanner SQL Injection Scanner Nikto Web Server Scan WhatWeb Web Site Analysis Drupal Security Scan Joomla Security Scan WordPress Security Scan BlindElephant Website Fingerprint Link: http://hackertarget.com/free-security-vulnerability-scans
  13. Need to use the mobile version of the application, that get 10TB.
  14. Using PowerShell for Penetration Testing Nishang is a framework and collection of scripts and payloads which enables usage of PowerShell for offensive security and post exploitation during Penetraion Tests. The scripts are written on the basis of requirement by the author during real Penetration Tests. Payloads: It contains many interesting scripts like download and execute, keylogger, dns txt pwnage, wait for command and much more. Help: All payloads and scripts are Get-Help compatible. Use "Get-Help <scriptname.ps1> -full" on a PowerShell prompt to get full help details. Download: http://nishang.googlecode.com/files/nishang_0.3.0.zip
  15. Social Engineering Tool for LinkedIn LinkedIn Klepto: A social engineering tool to perform company espionage on LinkedIn. Features: Auto-create Yahoo Email account, LinkedIn bait Account and verification Grant bait account permission to your linkedin app Send batch invitations to open networks or other found profiles fitting your search criteria Monitor the activities of your connections/targets, and aggregate connection information Download: https://github.com/dingzj/linkedin_klepto/archive/master.zip
  16. Nginx server configs is is a collection of configuration snippets that can help your server improve the web site's performance and security, while also ensuring that resources are served with the correct content-type and are accessible, if needed, even cross-domain. Download: https://github.com/h5bp/server-configs-nginx/archive/master.zip
  17. Lots of links by information security Categories: Hack sites Virus botnets malware & stuff Search sites Dns engines General research & blogs Wireless & bluetooth stuff Code stuff Wanna play a game? Daily summary sites Online tools Security stuff Misc stuff Link: http://www.cybersnipers.com
  18. knockd is a port-knock server. It listens to all traffic on an ethernet (or PPP) interface, looking for special "knock" sequences of port-hits. A client makes these port-hits by sending a TCP (or UDP) packet to a port on the server. This port need not be open -- since knockd listens at the link-layer level, it sees all traffic even if it's destined for a closed port. When the server detects a specific sequence of port-hits, it runs a command defined in its configuration file. This can be used to open up holes in a firewall for quick access. Options: -i, --interface <int> Specify an interface to listen on. The default is eth0. -d, --daemon Become a daemon. This is usually desired for normal server-like operation. -c, --config <file> Specify an alternate location for the config file. Default is /etc/knockd.conf. -D, --debug Ouput debugging messages. -l, --lookup Lookup DNS names for log entries. This may be a security risk! See section SECURITY NOTES. -v, --verbose Output verbose status messages. -V, --version Display the version. -h, --help Syntax help. Download: http://www.zeroflux.org/projects/knock
  19. mariorossi Release date: July 08, 2013 https://www.virustotal.com/en/file/c25a6d8f879a71f8718e9376d2dc8712d8d3785d4d16311bc8a9cab9b6a72bca/analysis/1385301006/ https://www.virustotal.com/en/file/b5ee07767102b6d945020f7b85da7ae6a20ca81b485bec4984eb06e4305530d3/analysis/1385301136/
  20. Sandy developed under Indian Honeynet and is capable of doing both static and dynamic analysis of Malicious Office, Jar,HTML files at the moment. Static | Dynamic Analyze Java exploits, Static analysis of Java malwares Limited support for office file formats Analysis of url having support for Firefox and IE browsers Link: Automated Exploit Analysis
  21. site: fakenamegenerator.com i'm grabbing +70 000 Identity Example: First: Pamela Mid: J. Last: Freeland State: CT City: New Milford Address: 1545 Hart Street Zip: 06776 Phone: 860-354-7869 Email: PamelaJFreeland@teleworm.com Birthday: February 9, 1985 (26 years old) Job: Ballet master Download: http://dl.dropboxusercontent.com/u/39292033/documents/Fake_3.txt
  22. Versus71

    Corban Works

    corbanworks.com Fake Name Generator Fake Pet Generator Fake File Generator Fake Mail Generator Fake Music Generator ESN Converter SSN Registry Word Unscrambler Name Generator.in Identity Generator
  23. VSEncryptor is an easy to use file and text encryption program. You can encrypt any file or text you choose. To access the file (or text) again, you would need access to the password that was used while encrypting. VSEncryptor is a serious solution, but at the same time is easy to use and does not require any technical background – just select any file (or type text) and choose ‘Encrypt’ – or simply drag the file to the proper editor box. VSEncryptor supports a variety of encryption algorithms, including: AES-128 AES-192 AES-256 RC2 RC4 DES Triple DES Blowfish Twofish Serpent Camellia Skipjack CAST-256 MARS RC5 RC6 IDEA SEED SHACAL-2 XTEA GOST VSEncryptor provides a command-line interface. Use: VSEncryptor.exe <input file> VSEncryptor.exe /ifile <input file> [/ofile <output file>] to open <input file> file. You can define name of destination file (<output file>) via "/ofile" Download: http://www.lokibit.com/download/vsencryptor/VSEncryptor_Setup_x86.exe http://www.lokibit.com/download/vsencryptor/VSEncryptor_Setup_x64.exe
×
×
  • Create New...