This tool demonstrates how to decode Internet Explorer 7, 8 and 9 passwords. Win32 binary and source code included.
154f902b038e28989bd7e2d0c9a2631f3b724a69beba0004b9362dd04a64951a
php_rshell is a ruby script which converts a binary backdoor to hex and creates a windows php reverse backdoor that will be executed on the server.
0fecd8cff34a4c706edcda435ad534f566cb1869bf12bb112959c918e6d7771c
This archive includes the source and a binary for a small Windows reverse shell.
90b4698c98d0968c39961359e2ce541617ee746a3f9d1e360bbc5deb166b3938
Hook Analyser is a hook tool which can be potentially helpful in reversing applications and analysing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer.
6d0c3ae3f1c1c82fc02292864c2d515ea8bb0b84e4978f88e74d9798eacfecb0
Arp Scannet is an arp who-has scanner for Windows.
6c1e0ffddab6b5ba0ca61651c91eddc46ab31fb24a54d4ac72f2ffccbd111a39
Google Talk decoder tool that demonstrates recovering passwords from accounts.
f22e21c764b1d148dce047075c8e5e1ad98da47c9ae526044a697f021a0bbb66
Chrome web browser decoder tool that demonstrates recovering passwords.
66d28558bf59fb4ed56c20e07d16601110120d4096f33f8d5a6591e5cef2732c
This is a tool that demonstrates dumping MD5 password hashes from the configuration file in Skype.
1c5bf93ebc41bc95553af5a1fa8a89d8ada7ff8cb06b4f21db26e8a540ca2921
Hook Analyser is a hook tool which can be potentially helpful in reversing applications and analysing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer.
506f27036f5d26070daf3d3c62cc27e131c705c194181de5ed9e10398b57c1f9
Hook Analyser is a hook tool which can be potentially helpful in reversing applications and analysing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer.
1b439ebab261ffcbe48d003f00d7836149ded3ebcbcc7d200890b3f7876a0fd1
A simple test to see is a host infected with earlier versions of "SpyEye" malware, which dropped a file at the same location every time. Good "proof of concept" showing that malware can be easily detected based on predictable behavior. later versions of SpyEye randomly chose their "drop file" location.
47fe222c307b38e17f5980aac2311b07cad91512447c0c7ebe7f8c9f9001844a
This is a rudimentary runtracer for Windows 7 on x86 (ASLR resilient).
0c338f0abacb1298c6e3159ef4e1383419cd701b04ef15d5434f37c70994813a
Hook Analyser is a hook tool which can be potentially helpful in reversing applications and analysing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer.
40872e53db04f39bca6a732865f07e2f6c917473b1e6b14b9b3cf3270a04df6d
Hook Analyser is a hook tool which can be potentially helpful in reversing applications and analysing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer.
7d2f41a189390b8efaf5de59d7f1048df482a9a4feec248e24e479441c720637
Technitium MAC Address Changer allows you to change Media Access Control (MAC) Address of your Network Interface Card (NIC) irrespective to your NIC manufacturer or its driver. It has a very simple user interface and provides ample information regarding each NIC in the machine.
c52fde9a3517d2d95b182f5a532a23fa0f13f2c771598819114293b01e59681d
Ostinato is an open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. This is the source code release.
6352a7f68b6f325e14965c399357591a7967cf3f94b01e84c3b50cc40feebb1d
Ostinato is an open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. This is the Windows binary release.
f5253935e65bded169b9eb1520383ec1ef681017576cffd49e913ce86360e776
Ostinato is an open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. This is the Mac OS X release.
b7e6bb1ee16faf6bfd26776d9d1ff947783c70e5a3d0cad08b8fa740360e6131
Hook analyser is a hook tool which can be potentially helpful in reversing applications and analysing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer.
1db4bd2ca0c97c9afeaffcb6b692042479d67663172e6fc873ec367da67ecb4e
Agnitio is a tool to help developers and security professionals conduct manual security code reviews in a consistent and repeatable way. Agnitio aims to replace the adhoc nature of manual security code review documentation, create an audit trail and reporting. Both x86 and x64 versions are included in this archive.
ea8f8d900c63a5b4ffd55ccbaf931a5028774259ceed201a1ec6b7a1da68e984
Hook analyser is a hook tool which can be potentially helpful in reversing applications and analysing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer.
5c11c01a960f568a12c3f67e3d3a95b84fe85db2801fc75ceaea8e5ad67ce77d
Digital forensics deals with the analysis of artifacts on all types of digital devices. One of the most prevalent analysis techniques performed is that of the registry hives contained in Microsoft Windows operating systems. Registry Decoder was developed with the purpose of providing a single tool for the acquisition, analysis, and reporting of registry contents.
0bf122d130ac2701097efb0279ea1770e47de47890bfe248c6efa066170e445e
Agnitio is a tool to help developers and security professionals conduct manual security code reviews in a consistent and repeatable way. Agnitio aims to replace the adhoc nature of manual security code review documentation, create an audit trail and reporting.
18a1bcf1963c15d188db323fb6a8a80d7ee42e6adea551aaf3604896aee68587
The del2info utility was written to analyze Windows Recycle Bin INFO2 and $I?????? files. It can extract file deletion time, original path, and size of deleted files and whether they have been moved from the Recycle Bin. It supports files from Windows 2000 to 7.
d9af4e13711d0f998ed0599ca3604c5038ea7c352aef1a208a24d81a31c2a4e7
The del2info utility was written to analyze Windows Recycle Bin INFO2 and $I?????? files. It can extract file deletion time, original path, and size of deleted files and whether they have been moved from the Recycle Bin. It supports files from Windows 2000 to 7.
fa2edd460df117e52c39ad39b8b0f0b417b334196c7359a880ad8fe1e451c3c8