General Purpose / Utility

General Purpose / Utility (22)

The Sysinternals Troubleshooting Utilities have been rolled up into a single Suite of tools. This file contains the individual troubleshooting tools and help files. It does not contain non-troubleshooting tools like the BSOD Screen Saver or NotMyFault.

Sunday, 16 August 2015 11:40 Written by in General Purpose / Utility

HP's fantastic SWFScan Adobe Flash de-compile tool and basic 'security scanner'

Sunday, 16 August 2015 11:39 Written by in General Purpose / Utility

Stormpath provides developers with Identity and Access Management tools to bolster security in any application. There is a free developer's version, as well as these paid versions: pro, premium and enterprise.

The tools do the following:
 1.Hosts and Deploys user directories in the Cloud
 2.Authenticates users and secures their passwords with one click
 3.Manages hierarchies and RBAC with a drag-n-drop interface or API
 4.Drops in code for user workflows like password reset, account verification and locking
 5.Handles all the user security maintenance, so the user is ahead of attackers
Free Features:
- 100,000 API Calls
- Unlimited Users
- Unlimited Groups
- Full API Access
Paid Features:
- Pro: Adds Custom End-user Emails
- Premium: Adds AD/LDAP Integration
- Enterprise: Adds 100% Uptime SLA

Sunday, 16 August 2015 11:38 Written by in General Purpose / Utility

SSLCat is a simple Unix utility that reads and writes data across an SSL enable network connection.
SSLCat accepts a hostname and optional port number (443 is used if none is specified) and attempts to form a SSLv2 connection to the specified host. If all goes well, data is read from stdin and sent across the encrypted connection, while incoming data from the encrypted connection is sent stdout.

Sunday, 16 August 2015 11:37 Written by in General Purpose / Utility
Sunday, 16 August 2015 11:12 Written by in General Purpose / Utility

OBEX is a transfer protocol that defines data objects and a communication protocol two devices can use to exchange those objects. OBEX is designed to enable devices supporting infrared communication to exchange a wide variety of data and commands in a resource-sensitive standardized fashion.

Usage Scenario

The typical example could be an object push of business cards to someone else. A more complex example is synchronizing calendars on multiple devices using OBEX.

Monday, 10 August 2015 16:17 Written by in General Purpose / Utility

Turbodiff is a binary diffing tool developed as an IDA plugin. It discovers and analyzes differences between the functions of two binaries.

Sunday, 28 June 2015 21:43 Written by in General Purpose / Utility

MultiHasher is a file hash calculator.

  • Calculate one or more hash values for a single file at once
  • Calculate hash values for multiple files and text string
  • Supported hash algorithms: CRC32, MD5, RIPEMD-160, SHA-1, SHA-256, SHA-384, SHA-512
  • Supports hash file verification (MHX, SFV, MD5Sum, etc.)
  • Supports NT file namespace
  • Able to query VirusTotal database
  • Able to upload files to VirusTotal (API key required)
  • Integrates with Windows Explorer context menu (optional)
  • Hash calculation can be canceled
  • Unicode support
  • Supports file drag'n'drop
  • Localizable UI
  • Included languages: Dutch, English (US and UK), French, Greek, Italian, Korean, Polish, Portuguese (Portugal and Brazil), Russian, Spanish and Turkish
  • Portable
Sunday, 28 June 2015 21:00 Written by in General Purpose / Utility

MSyslog is a logging subsystem for UNIX operating systems. It replaces the traditional UNIX logging daemon, syslogd, with an improved version that provides capabilities for log centralization, preservation of log integrity, and storage on a myriad of popular database engines. MSyslog, which stands for Modular Syslog, has a very flexible architecture that allows the administrator to configure it to receive log data from several input sources such as TCP and UDP network connections, UNIX named pipes and plaintext files. Log data storage is available through multiple output options including plaintext files, MySQL and PostgreSQL database engines. Log relaying can be performed over TCP sessions or the traditional UDP-based syslog protocol. MSyslog also supports filters that perform cryptographic integrity checks and filtering by regular expressions. MSyslog runs on a variety of UNIX and Linux operating systems.

Sunday, 28 June 2015 20:54 Written by in General Purpose / Utility

The MobiSec Live Environment Mobile Testing open source project is good for testing mobile environments, including devices, apps and supporting infrastructure.

It allows users to test their mobile environments to identify design weaknesses and vulnerabilities.

Testers get access to a host of open-source mobile testing tools, as well as the ability to install additional tools and platforms. Using a live environment allows pen testers to boot the MobiSec Live Environment on any Intel-based system from a DVD or USB flash drive, or run the test environment within a virtual machine.

Sunday, 28 June 2015 20:45 Written by in General Purpose / Utility
Page 1 of 2

Warranty Disclaimer

Warranty Disclaimer: lnfraGard Houston Members Alliance is a non-profit organization serving as a public-private partnership among U.S.  businesses, individuals involved in the protection and resilience of U.S. critical infrastructures, and the Federal Bureau of Investigation. The FBI, InfraGard, and its affiliates provide information, including but not limited to software, documentation, training, and other guidance to be known as “materials”. The materials are provided as-is and we expressly disclaim any and all warranties, express or implied, including, and without limitation, the implied warranties of merchantability, fitness for a particular purpose, non-infringement, quiet enjoyment, and integration, and warranties arising out of course of dealing or usage of trade. You agree that, as between you and the FBI, InfraGard, and its affiliates, you are responsible for the outcome of the use of materials made available, including but not limited to adherence to licensing requirements, and taking legal and regulatory considerations into account. There is no guarantee of accuracy, completeness, timeliness, or correct sequencing of the information provided.