Zer0Byte

Geekiest Techno News

Captcha Intruder: Captcha Pentesting Tool

Dear leets this tools looks promising. Just have look at its video and see what can be done against website security check point Captchas. Captcha Intruder is an automatic pentesting tool to bypass captchas.   Installation Code runs on many platforms. It requires Python and the following libraries: python-pycurl – Python bindings to libcurl python-libxml2  [ Read More ]

Xplico Network Forensic Analysis Tool

Xplico is an open source Network Forensic Analysis Tool (NFAT) that allows for data extraction from traffic captures. It supports extraction of mail from POP, IMAP, and SMTP, can extract VoIP streams, etc. This is the version that has a GUI allowing you to view photos, texts and videos contained in MMS messages. Changes: SQLite  [ Read More ]

Installing TOR (the onion routing) proxy on Back|track:

Dear l33ts, Check out this great post from our l33t author “Aniket Napster”. # TOR on Back|Track: # With Polipo & Vidalia I. Preface. I put this together due to it being difficult to install TOR properly on Back|Track. While there are other methods used, I personally found this more grounded than others for my  [ Read More ]

POUND – REVERSE-PROXY AND LOAD-BALANCER

POUND – REVERSE-PROXY AND LOAD-BALANCER The Pound program is a reverse proxy, load balancer and HTTPS front-end for Web server(s). Pound was developed to enable distributing the load among several Web-servers and to allow for a convenient SSL wrapper for those Web servers that do not offer it natively. Pound is distributed under the GPL – no warranty, it’s free to  [ Read More ]

TOR Virtual Network Tunneling Tool 0.2.2.35

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks  [ Read More ]

John The Ripper 1.7.9 Jumbo 5

John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types  [ Read More ]

Note For Geeks :- If you guys can use this tool they way the developer has designed it, i can guarantee that u will be able to save alot of time while launching phising attacks. Ghost Phisher is a computer security application that comes inbuilt with a Fake DNS Server, Fake DHCP Server, Fake HTTP server  [ Read More ]

The Suricata Engine: IDPE

The Suricata Engine is an Open Source Next Generation Intrusion Detection and Prevention Engine. This engine is not intended to just replace or emulate the existing tools in the industry, but will bring new ideas and technologies to the field. OISF is part of and funded by the Department of Homeland Security’s Directorate for Science and  [ Read More ]