Tag: Linux OS

EncFS MP

Mounts EncFS folders on Windows and OS X Can create, edit, export and change the password of EncFS folders Is 100% compatible with EncFS 1.7.4 on Linux Completely free, no nags, no additional downloads like toolbars etc. With EncFS MP, you can store your data in an encrypted folder. This is especially important if you …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2016/10/27/encfs-mp/

Exploring Programming Language Architecture in Perl

By the end of this book you should have a thorough understanding of the inner workings of a programming language interpreter. The source code is presented in full, and several iterations add more features until it could be considered pretty complete. The interpreter is written to be as easy to understand as possible; it has …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2016/10/25/exploring-programming-language-architecture-in-perl/

OPEN SECURITY TRAINING .INFO

In the spirit of OpenCourseWare and the Khan Academy, OpenSecurityTraining.info is dedicated to sharing training material for computer security classes, on any topic, that are at least one day long. All material is licensed with an open license like CreativeCommons, allowing anyone to use the material however they see fit, so long as they share …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2016/10/19/open-security-training-info/

Computer Science 530 – Syllabus and Reading List — Fall 2016

University of Southern California Information Sciences Institute http://ccss.usc.edu/530/fall16/16-sylrl.html

Permanent link to this article: http://www.darknessgate.com/2016/09/28/computer-science-530-syllabus-and-reading-list-fall-2016/

LiME (formerly DMD)

LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices, such as those powered by Android. The tool supports acquiring memory either to the file system of the device or over the network. Full Android memory acquisition Acquisition over network interface Minimal process footprint …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2016/09/17/lime-formerly-dmd/

EtherApe

EtherApe is a graphical network monitor for Unix modeled after etherman. Featuring link layer, IP and TCP modes, it displays network activity graphically. Hosts and links change in size with traffic. Color coded protocols display. It supports Ethernet, FDDI, Token Ring, ISDN, PPP, SLIP and WLAN devices, plus several encapsulation formats. It can filter traffic …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/04/21/etherape/

Snort 2.9.7.0

Open-Source IDS/IPS Download Snort

Permanent link to this article: http://www.darknessgate.com/2015/03/04/snort-2-9-7-0/

Medusa Parallel Network Login Auditor

Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application: Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently. …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/02/24/medusa-parallel-network-login-auditor/

Crowbar

Crowbar (crowbar) is brute forcing tool that can be used during penetration tests. It is developed to brute force some protocols in a different manner according to other popular brute forcing tools. As an example, while most brute forcing tools use username and password for SSH brute force, Crowbar uses SSH key. So SSH keys, …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/02/23/crowbar/

CAINE (Computer Aided INvestigative Environment)

CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a Digital Forensics project Currently the project manager is Nanni Bassetti. CAINE offers a complete forensic environment that is organized to integrate existing software tools as software modules and to provide a friendly graphical interface. The main design objectives that CAINE aims …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/01/24/caine-computer-aided-investigative-environment/

SilentEye

SilentEye is a cross-platform application design for an easy use of steganography, in this case hiding messages into pictures or sounds. It provides a pretty nice interface and an easy integration of new steganography algorithm and cryptography process by using a plug-ins system. SilentEye is free to use (under GNU GPL v3). Main Features Hide …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/12/25/silenteye/