PANBuster

06:43 ---
PANBuster is a command-line tool allowing to easily search for credit card numbers stored in clear-text on a system.
As required by the PCI DSS standard, Primary Account Numbers (PAN) – also known as “credit card numbers” – must never be stored without strong encryption and a proper keys management.
PANBuster is provided to help PCI QSA, system administrators, developpers, auditors and forensics identify clear-text PAN with minimum false-positive detections.

DOWNLOAD AND SOURCE

peepdf

06:33 ---
peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful or not. The aim of this tool is to provide all the necessary components that a security researcher could need in a PDF analysis without using 3 or 4 tools to make all the tasks. With peepdf it's possible to see all the objects in the document showing the suspicious elements, supports all the most used filters and encodings, it can parse different versions of a file, object streams and encrypted files. With the installation of Spidermonkey and Libemu it provides Javascript and shellcode analysis wrappers too. Apart of this it's able to create new PDF files and to modify existent ones

source and download

SpyBHORemover

05:49 ---
SpyBHORemover (previously called BHORemover) is the advanced tool to explore and eliminate malicious BHO's from the system. BHO stands for 'Browser Helper Objects' which are plugins written for 'Internet Explorer' to enhance its capabilities. Often this feature is being misused by many spyware programs to monitor user's browsing habits and to steal the users credentials silently. Also some of the BHO's slow down the system considerably.

SpyBHORemover helps in quick identification and elimination of such spy BHO's present in the system. It not only performs heuristic based threat analysis but also provides online threat verification mechanism which makes it easy to differentiate between legitimate and malicious BHOs.

It also features 'Backup & Restore' feature which makes it easy to remove and re-install the BHO any number of times. Users no longer have to worry about accidental removal of BHO as all removed BHOs are automatically backed up which can then be restored from 'Removed BHO List'. It also comes with a unique feature to completely enable/disable all installed BHOs at one shot.

Current version comes with 'Setup Wizard' for local Installation & Uninstallation of the software. It also includes automatic software updater to detect new versions.

SpyBHORemover works on wide range of platforms starting from Windows XP to latest operating system, Windows 7.




Features of SpyBHORemover

Here are the highlights of some of the salient features of SpyBHORemover which makes it special.
  • Automatically scan & display all installed and previously removed BHOs instantly.
  • 'Advanced Threat Analysis' for each installed BHO using the built-in heuristic mechanism.
  •  Color based threat representation for quick identification and separation of BHOs based on various threat levels.
  •  New 'Backup & Restore' feature enables user to remove and re-install BHO as many times without any worries.
  •  Shows all running processes having the selected BHO DLL and provides option to Kill the process or Remove the DLL from such process.
  •  Unique feature to completely enable/disable ALL installed BHOs for the current user at one shot.
  •  'Online Threat Verification' of malicious BHO using any of the following popular online portals.

    • VirusTotal (www.VirusTotal.com)
    • ThreatExpert (www.ThreatExpert.com)
    • ProcessLibrary (www.ProcessLibrary.com)
  •  One click BHO removal option to remove the selected BHO instantly.
  •  Right click menu option for all the lists for quickly execution desired action.
  •  View detailed properties of selected BHO DLL through double click or right click menu options.
  •  Quickly jump to corresponding BHO location in Registry using Regedit tool for selected BHO.
  •  Export the complete BHO scan report along with threat analysis information to standard HTML format for offline analysis.
  •  Displays detailed information for each installed BHO

    • BHO Class Name
    • Threat Analysis Information
    • Company
    • Product Name
    • Install Date
    • CLSID of the BHO
    • BHO File Path
  •  Enriched GUI interface with user friendly options and cool buttons.
  •  Sort feature to arrange the displayed BHO's based on various parameters such as BHO name/threat level/company/product name/date/clsid/dll path.
  •  Does not require any installation as it is standalone portable tool and can be run directly on any 
  • system. 
      
How to use SpyBHORemover

Here is the brief usage information.
  •  Run SpyBHORemover on your system and it will automatically list all installed BHO's on the system as shown in the screenshot 1 below.
  •  It shows each of the installed BHO with different colors based on the threat levels which helps in distinguishing between malicious and legitimate BHO.
  •  Once you click on any of the BHO, it will display the 'Process List' at the bottom showing all the running processes having the selected BHO DLL.
  •  Then you can choose to Kill such process or Remove the BHO DLL from that process using right click menu options.
  •  For any suspicious BHO you can right click on its entry which will display popup menu with more options. Then you can choose 'Check online' option to perform online threat verification.
  •  To remove any of the malicious BHO, just click on 'Remove' button which will instantly disable it and store the entry in the backup list.
  •  If you have accidently removed the BHO or if you just want to re-install any previous removed BHO then you can select it from the 'Removed BHO List' and click on 'Restore' button to re-install it.
  •  Alternatively you can enable/disable all BHO's at one shot using the 'Enable/Disable BHO' button at the bottom.
  •  Finally you can export the entire scan report with all details to HTML file using 'Export' button.
Note that you have to run SpyBHORemover as administrator to remove or restore the BHO. Otherwise you will be only able to view installed and removed BHO list. Any attempt to remove or restore BHO will fail due to insufficient privileges.
 download and source

BadAss 0.4 Beta

08:15 ---
BadAss is a Ruby script that makes it very easy to perform cracking attacks, port scanning, and more.
Changes: New ruby script added sqlmap.rb, a very simple interface for sqlmap dorking. 
 
download and source

Text to Audio

07:12 ---
  1. Open Notepad file on your Windows PC.
  2. Copy and paste the below mentioned code :
      Dim msg, sapi msg=InputBox("Enter your text for conversion–www.techvorm.com","TechVorm Text-To-Audio Converter") Set sapi=CreateObject("sapi.spvoice") sapi.Speak msg
  3. Save this file with any name with .vbs as extension. For eg. hackers-arsenal.vbs

PHP Vulnerability Hunter

06:50 ---
                                                   



This is the application that detected almost all of the web application vulnerabilities listed on the advisories page. PHP Vulnerability Hunter is an advanced automated whitebox fuzz testing tool capable of triggering a wide range of exploitable faults in PHP web applications. Minimal configuration is necessary to begin a scan; PHP Vulnerability Hunter doesn’t even need a user specified starting URI.

download trial version

100 linux tips and tricks

06:43 ---
these book covers about a hundred Linux tips and tricks.


download and source