Encrypting email with Encipher.it bookmarklet is a simple way to protect your sensitive data. You can encrypt emails with your private info and only the recipient can decrypt it with correct password.

To deal with email encryption you have to type the message in gmail or other email web service, click on "Encipher it" button and create a password. In the same way you can encrypt messages in outlook.com or other web services.

You need to enter your message in a text field, use bookmarklet and type a password to encrypt message.

pcapdj - dispatch pcap files

Network captures often result in very large files. Therefore, tools like tcpdump or dumpcap offer features of file rotation either after a fixed size or a fixed amount of time.

When these files are analyzed focusing on stateful protocols such as TCP, TCP sessions could have been established in one pcap file and continue in the next pcap files. When these TCP sessions have to be properly reassembled, then either the TCP reassembly tool has to support multiple pcap files as input or the pcap files have to merged in a single file using for instance a tool such as editcap. However, in this case, very large files are the results, that were tried to be avoided with the file rotation.

PCAPDJ processes a list of pcap files and write each individual packet in a named pipe. A second process reads these individual packets and does some processing. A third process, does some cleanup operations and controls pcapdj.

Each pcap file that is processed by pcapdj must be authorized by a third process. When a pcap file is not acknowledged the file descriptor to the named pipe is not closed and hence the other program processing pcap data does not end and keeps its internal states. Before a next file is authorized, other tasks could be done, such as removing duplicated files or already processed pcap files in order to free disk space.

logstash is a tool for managing events and logs. You can use it to collect logs, parse them, and store them for later use (like, for searching). Speaking of searching, logstash comes with a web interface for searching and drilling into all of your logs.

It is fully free and fully open source. The license is Apache 2.0, meaning you are pretty much free to use it however you want in whatever way.

Ship logs from any source, parse them, get the right timestamp, index them, and search them. All your logs from all over your infrastructure in one place - with searching and graphing. Since we can easily parse text-based logs, you can query for more precise things like, all 404 http errors, nagios critical alerts in hard state, or mail server faults - all without accidentally finding logs with the word ‘404’ or ‘critical’

Let’s get started with Fluentd! Fluentd is a fully free and fully open-source log collector that instantly enables you to have a ‘Log Everything’ architecture with 125+ types of systems.

Fluentd treats logs as JSON, a popular machine-readable format. It is written primarily in C with a thin-Ruby wrapper that gives users flexibility.

Fluentd’s performance has been proven in the field: its largest user currently collects logs from 5000+ servers, 5 TB of daily data, handling 50,000 msgs/sec at peak time.

" The professional, open source development tool for the open web. Develop and test your entire web application using a single environment. With support for the latest browser technology specs such as HTML5, CSS3, JavaScript, Ruby, Rails, PHP and Python "

PoC implementation of a brute force attack against WPS - PIN External Registrar.
Most of the wifi vendors are supported.

Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as described in

Kali Linux is an advanced Penetration Testing and Security Auditing Linux distribution.Kali Linux FeaturesKali is a complete re-build of BackTrack

HTTPFlooder is a tool that can perform stress tests, load tests, botnet simulation, DoS/DDoS tests and fuzzing for HTTP protocol.It supports the fo

Features:
Virtual appliance based on Xubuntu 12.04 Desktop.
Distributed as a single OVA file, ready to be imported.
Full LAMP stack installed (Apache 2, MySQL 5), plus tools such as phpMyAdmin.
Kippo SSH honeypot, plus Kippo-Graph, Kippo2MySQL and other helpful scripts.
Dionaea malware honeypot, plus DionaeaFR and other helpful scripts.
Amun malware honeypot, plus helpful scripts.
Kojoney SSH honeypot, plus helpful scripts.
Glastopf web honeypot, along with Wordpot WordPress honeypot.
Honeyd low-interaction honeypot, plus Honeyd2MySQL, Honeyd-Viz and other helpful scripts.
LaBrea sticky honeypot, Tiny Honeypot, IIS Emulator and INetSim.
Thug honeyclient for client-side attacks analysis, along with mwcrawler malware collector.
A full suite of security, forensics and anti-malware tools for network monitoring, malicious shellcode and PDF analysis, such as ntop, p0f, EtherApe, nmap, DFF, Wireshark, ClamAV, ettercap, Automater, UPX, pdftk, Flasm, pdf-parser, Pyew, dex2jar and more.
Firefox plugins pre-installed, plus extra helpful software such as GParted, Terminator, Adminer, VYM, Xpdf and more.

The netsniff-ng toolkit consists of the following utilities:

netsniff-ng is a high-performance network analyzer based on packet mmap(2) mechanisms. It can record pcap files to disc, replay them and also do an offline and online analysis. Capturing, analysis or replay of raw 802.11 frames are supported as well. pcap files are also compatible with tcpdump or Wireshark traces. netsniff-ng processes those pcap traces either in scatter-gather I/O or by mmap(2) I/O.
trafgen is a high-performance network traffic generator based on packet mmap(2) mechanisms. It has its own flexible, macro-based low-level packet configuration language. Injection of raw 802.11 frames are supported as well. trafgen has a significantly higher speed than mausezahn and comes very close to pktgen, but runs from user space. pcap traces can also be converted into a trafgen packet configuration.
mausezahn is a performant high-level packet generator that can run on a hardware-software appliance and comes with a Cisco-like CLI. It can craft nearly every possible or impossible packet. Thus, it can be used, for example, to test network behaviour under strange circumstances (stress test, malformed packets) or to test hardware-software appliances for several kind of attacks.
bpfc is a Berkeley Packet Filter (BPF) compiler that understands the original BPF language developed by McCanne and Jacobson. It accepts BPF mnemonics and converts them into kernel/netsniff-ng readable BPF ``opcodes''. It also supports undocumented Linux filter extensions. This can especially be useful for more complicated filters, that high-level filters fail to support.
ifpps is a tool which periodically provides top-like networking and system statistics from the Linux kernel. It gathers statistical data directly from procfs files and does not apply any user space traffic monitoring that would falsify statistics on high packet rates. For wireless, data about link connectivity is provided as well.
flowtop is a top-like connection tracking tool that can run on an end host or router. It is able to present TCP or UDP flows that have been collected by the kernel's netfilter framework. GeoIP and TCP state machine information is displayed. Also, on end hosts flowtop can show PIDs and application names that flows relate to. No user space traffic monitoring is done, thus all data is gathered by the kernel.
curvetun is a lightweight, high-speed ECDH multiuser VPN for Linux. curvetun uses the Linux TUN/TAP interface and supports {IPv4,IPv6} over {IPv4,IPv6} with UDP or TCP as carrier protocols. Packets are encrypted end-to-end by a symmetric stream cipher (Salsa20) and authenticated by a MAC (Poly1305), where keys have previously been computed with the ECDH key agreement protocol (Curve25519).
astraceroute is an autonomous system (AS) trace route utility. Unlike traceroute or tcptraceroute, it not only display hops, but also their AS information they belong to as well as GeoIP information and other interesting things. On default, it uses a TCP probe packet and falls back to ICMP probes in case no ICMP answer has been received.

KGB Archiver is the compression tool with unbelievable high compression rate. It surpasses even such efficient compression tool like 7zip and UHARC in terms of the abilities. KGB Archiver uses AES-256 encryption to encrypt archives.

OpenShift is Red Hat's Platform as a Service (PaaS) offering.

Hack.me is a FREE, community based project powered by eLearnSecurity.

On this page we have selected two open source cluster and server farm monitoring software. If you need monitoring for a cluster system you are going to need a different approach. At AmbitWire we hope that this selection of open source cluster monitoring and management systems will prove helpful to your quest.

On this page AmbitWire team has selected 8 best open source cloning and distribution software tools. If you are looking for a suggestion and recommendation for a open source tools to do : mass deployment of operating systems and software update

On this page AmbitWire team has selected 8 best open source cloning and distribution software tools.

tmux is a terminal multiplexer: it enables a number of terminals (or windows), each running a separate program, to be created, accessed, and contro

Qure Analyzer is a FREE solution for analyzing and comparing SQL Server trace files (workloads).
Qure Analyzer's intuitive graphical interface helps you quickly identify and analyze performance bottlenecks. And thanks to multi-dimensional grouping, sorting and filtering you can easily isolate the most resource-consuming SQL statements, applications, users, hosts and more.
Qure Analyzer also introduces the ability to compare database workloads before-and-after a hardware change, version upgrade, or tuning
effort. Even dissimilar workloads can be reliably compared, thanks to Qure Analyzer’s powerful equalization and weighting capabilities.
Both SQL Server trace files and SQL Server trace tables are supported.

is a UNIX shell script similar to supportinfo, getsysinfo or get_config, except that it creates a HTML (and plain ASCII) system documentation for HP-UX 10.xx/11.xx, Integrity Virtual Machine, SCO-UNIX, AIX, Sun OS and Linux systems. Plug-ins for SAP, Oracle, Informix, Serviceguard, Fiber Channel/SAN, TIP/ix, OpenText (IXOS/LEA), SAN Mass Storage like MAS, EMC, EVA, XPs, Network Node Manager and DataProtector etc. are included. The first versions of cfg2html were written for HP-UX. Meanwhile the cfg2html HP-UX stream was ported to all major *NIX platforms and small embedded systems.

Some consider it to be the Swiss army knife for the Account Support Engineer, Customer Engineer, System Admin, Solution Architect etc. Originally developed to plan a system update, it was also found useful to perform basic troubleshooting or performance analysis. The production of nice HTML and plain ASCII documentation is part of its utility.

Low Orbit Ion Cannon (LOIC) is an open source network stress testing and denial-of-service attack application, written in C#. LOIC was initially developed by Praetox Technologies, but was later released into the public domain and now is hosted on several open source platforms.
The software has inspired the creation of an independent JavaScript version called JS LOIC, as well as LOIC-derived web version called Low Orbit Web Cannon. These enable a DoS from a web browser. [wikipedia]

Moloch is an open source large scale IPv4 PCAP capturing, indexing and database
system. A simple web interface is provided for PCAP browsing, searching, and
exporting. APIs are exposed that allow PCAP data and JSON formatted session
data to be downloaded directly. Simple security is implemented by using https
and HTTP digest password support. Moloch is not meant to replace IDS engines but
instead work along side them to store and index all the network traffic in standard
PCAP format, providing fast access. Moloch is built to be deployed across many
machines and can scale to handle multiple gigabits/sec of traffic.

Inundator is a multi-threaded, queue-driven, anonymous intrusion detection false positives generator with support for multiple targets.