2Pix integrates with Windows to allow you to easily encrypt and hide files in bitmap images, a process called steganography (not to be confused with stenography). Data is stored in the low-order bits of each pixel of an image, so the file is completely hidden from view. Version 1.1 now provides plausible deniability because no unencrypted signature is stored in the image header. It should be impossible to prove an image contains a hidden file (if you use a strong password and only use 1 or 2 bits per pixel component).


7-Zip is open source software. Most of the source code is under the GNU LGPL license. The unRAR code is under a mixed license: GNU LGPL + unRAR restrictions. Check license information here: 7-Zip license.

You can use 7-Zip on any computer, including a computer in a commercial organization. You don't need to register or pay for 7-Zip.
The main features of 7-Zip

8 best open source cloning and distribution software tools recommended by AmbitWire team


The idea behind this article is to put together the best /in our opinion/ Open Source  software there is for Inventory and Software management of multiple  /we mean A LOT OF/ hosts. 

If you would like to automatically install software,patches and scripts on a lot of hosts or  update OS's - some of these open source configuration software packages do that with ease both in a shell and graphical environment. Some of the systems listed below do much more. 


A simple packet crafting tool that turns text commands into pcaps. Optionally build a DAQ and Snort can directly read commands or raw payload data - no pcap required. Packets can exhibit any flaw or anomaly desired. Syntax is flexible and powerful.


Actual Keylogger

Actual Keylogger - is a free keylogger which runs hidden in the background and automatically records all keystrokes (including Alt, Ctrl and other functional buttons). The interface can be password protected and the log files are encrypted. You can view the reports as HTML or plain text. In the hidden mode it is invisible in all operating systems. This free keylogger will be really helpful to both the system administrators and home users.


Open Source, so everyone can see how Adium works and help improve it
Support for a wide range of different Instant Messaging services (see the full list)
A delightful UI
Tabbed chat windows
Mac OS X integration
Address Book integration
WebKit Message View: Theme your chat windows
Combined Contacts: Merge your contacts so that each one represents a person, not an account
A sophisticated events system (including Growl notifications)
OTR Encryption
File Transfer

AES Crypt

AES Crypt is a file encryption software product available on several operating systems that uses the industry standard Advanced Encryption Standard (AES) to easily and securely encrypt files.


AfterGlow is a collection of scripts which facilitate the process of generating link graphs. The tool is written in Perl and needs to be invoked via the command line. Sorry, there is no graphical interface, however using the tool is quite simple. As input, AfterGlow expects a CSV file. The file can either contain two or three columns of data. A common way of generating the CSV files are parsers which take a raw input file, analyze it and output a comma separated list of records based on the data they found. The output of AfterGlow is one of two formats.


AIDE (Advanced Intrusion Detection Environment) is a file and directory integrity checker.

It creates a database from the regular expression rules that it finds from the config file(s). Once this database is initialized it can be used to verify the integrity of the files. It has several message digest algorithms (see below) that are used to check the integrity of the file. All of the usual file attributes can also be checked for inconsistencies. It can read databases from older or newer versions. See the manual pages within the distribution for further info.


A highly scalable network emulation tool which emulates dynamic, mobile ad-hoc wireless network topologies in real-time, featuring easy deployment and detailed network models. It was developed in the research project HIDENETS