advanced password recovery
FreeOTP is a two-factor authentication application for systems utilizing one-time password protocols. Tokens can be added easily by scanning a QR code. If you need to generate a QR code, try our QR code generator.
Zeus is a powerful tool for AWS EC2 / S3 / CloudTrail / CloudWatch / KMS best hardening practices. It checks security settings according to the profiles the user creates and changes them to recommended settings based on the CIS AWS Benchmark source at request of the user.
WPSeku is a black box WordPress vulnerability scanner that can be used to scan remote WordPress installations to find security issues.
What every Browser knows about you
désactive OneDrive, Cortana, Bing, le fameux Wifi Sense, et bien sûr tout ce qui envoie des données à Microsoft, le partage des mises à jour en P2P, les services Xbox Live, les pubs dans le menu Démarrer, les popups de mise à jour reloues, boucher quelques failles qui permettent la fuite de données via Edge et Defender et même supprimer les identifiants uniques qui permettent de différencier votre installation Windows d'un autre.
An interactive console program that allows traffic flows to be intercepted, inspected, modified and replayed.
LightBulb is an open source python framework for auditing web applications firewalls.
FastNetMon is a very high performance DDoS detector built on top of multiple packet capture engines: NetFlow, IPFIX, sFLOW.
An Efficient Communication System With Strong Anonymity
SELKS is a free and open source Debian (with LXDE X-window manager) based IDS/IPS platform released under GPLv3 from Stamus Networks (https://www.stamus-networks.com/).
Keybase maps your identity to your public keys, and vice versa.
Needle is an open source, modular framework to streamline the process of conducting security assessments of iOS apps.
Open source log management that actually works.
Cloud oriented pentesting distribution
debugs memory leak of running process, without recompiling or restarting, on GNU/Linux and FreeBSD
Security issues happen for two reasons -
Developers who have just started and cannot really tell a difference between using MD5 or bcrypt.
Developers who know stuff but forget/ignore them.
Our detailed explanations should help the first type while we hope our checklist helps the second one create more secure systems. This is by no means a comprehensive guide, it just covers stuff based on the most common issues we have discovered in the past.
I2P is an anonymous network, exposing a simple layer that applications can use to anonymously and securely send messages to each other. The network itself is strictly message based (a la IP), but there is a library available to allow reliable streaming communication on top of it (a la TCP). All communication is end to end encrypted (in total there are four layers of encryption used when sending a message), and even the end points ("destinations") are cryptographic identifiers (essentially a pair of public keys).
The Facebook CTF is a platform to host Jeopardy and “King of the Hill” style Capture the Flag competitions.
Online WPA WPA2 NTLM MD5 DESCRYPT MD5CRYPT Password Cracker.
Crackq is an online distributed GPU-accelerated password cracker designed to help penetration testers and network auditors identify weak passwords. It supports a number of hash types and we are actively adding new algorithms. There are no delays associated with manual submissions and payment processing. The results are emailed automatically as soon as the hash is processed.