Tag: Cyber intelligence

Guerrilla Mail – Disposable Temporary E-Mail Address

Guerrilla Mail gives you a disposable email address. There is no need to register, simply visit Guerrilla Mail and a random address will be given. You can also choose your own address. You can give your email address to whoever you do not trust. You can view the email on Guerrilla Mail, click on any …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2016/09/11/guerrilla-mail-disposable-temporary-e-mail-address-2/

Tutanota |Secure email provider (Free)

Tutanota automatically encrypts all your data on your device. Your emails as well as your contacts stay private. You can easily communicate with any of your friends end-to-end encrypted. Even subject and attachments as well as all your contacts are encrypted. Tutanota is licensed under GPL v3 – essential to any encryption service. Open source …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2016/09/10/tutanota-secure-email-provider-free/

ProtonMail | Best secure email provider (Free)

Secure Email Based in Switzerland which has many security enhancing features: End-to-End Encryption Messages are encrypted at all times Messages are stored on ProtonMail servers in encrypted format. They are also transmitted in encrypted format between our servers and user devices. Messages between ProtonMail users are also transmitted in encrypted form within our secure server …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2016/09/10/protonmail-best-secure-email-provider-free/

Framework for Improving Critical Infrastructure Cybersecurity

The Framework is voluntary guidance, based on existing standards, guidelines, and practices, for critical infrastructure organizations to better manage and reduce cybersecurity risk. In addition to helping organizations manage and reduce risks, it was designed to foster risk and cybersecurity management communications amongst both internal and external organizational stakeholders. https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-021214.pdf

Permanent link to this article: https://www.darknessgate.com/2016/09/04/framework-for-improving-critical-infrastructure-cybersecurity/

StartPage

StartPage by Ixquick (www.ixquick.com) combines the powerful search results of Google with the strong privacy features of Ixquick, the world’s most private search engine. The result is great search results – with total privacy protection! No IP addresses are stored, no personal data is gathered or passed on to third parties, and no identifying cookies …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2016/09/01/startpage/

Timestomp

Timestomp allows you to delete or modify all four New Technology File System (NTFS) timestamp values: Modified, Accessed, Created and Entry Modified. http://www.jonrajewski.com/data/for270/timestomp.exe Tool offical website is currently offline: https://www.bishopfox.com/resources/tools/other-free-tools/mafia/

Permanent link to this article: https://www.darknessgate.com/2016/07/29/timestomp/

Steghide UI

Steghide UI is a nifty GUI written by Drunken.Canadian for the console application steghide as the name suggests. It allows the user to everything steghide can but with a nice user friendly GUI. Now, steghide UI has a new options panel. Download Steghide UI

Permanent link to this article: https://www.darknessgate.com/2016/06/09/steghide-ui/

JPHIDE and JPSEEK

JPHIDE and JPSEEK are programs which allow you to hide a file in a jpeg visual image. There are lots of versions of similar programs available on the internet but JPHIDE and JPSEEK are rather special. The design objective was not simply to hide a file but rather to do this in such a way …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2016/06/08/jphide-and-jpseek/

Snort 2.9.7.0

Open-Source IDS/IPS Download Snort

Permanent link to this article: https://www.darknessgate.com/2015/03/04/snort-2-9-7-0/

Wfuzz

Wfuzz is a tool designed for bruteforcing Web Applications, it can be used for finding resources not linked (directories, servlets, scripts, etc), bruteforce GET and POST parameters for checking different kind of injections (SQL, XSS, LDAP,etc), bruteforce Forms parameters (User/Password), Fuzzing,etc. Some features: * Multiple Injection points capability with multiple dictionaries * Recursion (When doing …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2015/02/26/wfuzz/

Crowbar

Crowbar (crowbar) is brute forcing tool that can be used during penetration tests. It is developed to brute force some protocols in a different manner according to other popular brute forcing tools. As an example, while most brute forcing tools use username and password for SSH brute force, Crowbar uses SSH key. So SSH keys, …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2015/02/23/crowbar/