172 private links
KiTTY is a fork from version 0.69 of PuTTY, the best telnet / SSH client in the world.
KiTTY is only designed for the Microsoft® Windows® platform. For more information about the original software, or pre-compiled binaries on other systems, you can go to the Simon Tatham PuTTY page.
KiTTY has all the features from the original software, and adds many others as described.
MobaXterm provides all the important remote network tools (SSH, X11, RDP, VNC, FTP, MOSH, ...) and Unix commands (bash, ls, cat, sed, grep, awk, rsync, ...) to Windows desktop, in a single portable exe file which works out of the box. More info on supported network protocols
Simplify the security assessment process with hosted vulnerability scanning tools.
Here's an overview of the various breaches that have been consolidated into this Have I Been Pwned. These are accessible programmatically via the HIBP API and also via the RSS feed.
For many years, DomainTools has served the domain professional community with Whois and domain name research tools to drive your investments, research buyers, find new domains and manage existing portfolios.
"Software that Works for Locksmiths"
Great Scott Gadgets makes open source hardware for innovative people.
Everything we produce at Great Scott Gadgets is open source, including all our hardware designs, software, and educational content. Our goal is to enable you to do things nobody has done before. We do that by building innovative hardware and software tools and by educating the community both online and through industry events. Most importantly, we support the community by releasing all of our work under open source licenses.
I work for OETIKER+PARTNER AG a consultancy company based in Olten, Switzerland. We use OpenSource Software extensively in all our projects. So I made it a habit to open source code we write whenever possible. Below is a list of notable projects I have created or been involved with over the years.
SANS Dashboard:
Network Activity; Offensive IPs; Ports by Unique Sources; Ports by Unique Targets; Ports by Total Activity; StormCast; Diaries; Lastest Vulnerabilities
README
Welcome to lagout.org !
If you want to make a copy of this website, go ahead, the server can handle the load !
If you think that the library should have new documents, tell us !
This website contains a collection of my opinions, photos and, more usefully, a bunch of open source software. Mostly I write about software and my experience creating and distributing it.
Here are my most recently updated / published work:
Server side spam filtering An updated guide to getting seamless server side spam filtering using bogofilter
Web Journal My weblog/online journal
Go Techniques Some techniques I've learned for writing in Golang
Forest Bus A distributed message bus / commit log for Go, Java and Python
SimpleTAL A standalone Python HTML & XML template library
PubTal The software used to maintain OwlFish.com - builds HTML pages from text files
Additionally I've also published ExpenseClam, an Expense tracking application for Android, on Google Play.
This is software for producing a 2D animation.
It is based on the software "Toonz", which was developed by Digital Video S.p.A. in Italy, customized by Studio Ghibli, and has been used for creating its works for many years. Dwango launches this OpenToonz project, in cooperation with Digital Video and Studio Ghibli.
This software can be used by anyone free of charge, no matter whether the purpose of use is commercial or not.
This is available as an open source, so that users can modify its source code freely.
We aim to develop a new platform for connecting the academic research into frontline animation production.
VirusTotal Intelligence allows you to search through our dataset in order to identify files that match certain criteria (antivirus detections, binary content, metadata, submission file names, file format structural properties, file size, etc.). We could say that it is pretty much like the "Google" of malware.
In order to ease the use of the application we have classified the search queries and modifiers into the following categories, you can combine any number of them in the same query, moreover, you can use AND, OR and NOT operators to tweak your searches.
Like telephone numbers there are directories that relate the IP addresses to names such as "cnn.com". These names are called domain names and the directories are run on servers called Domain Name Servers or DNS. A Reverse DNS Lookup queries these servers in an attempt to find a match.
Free Website Malware and Security Scanner:
Enter a URL (ex. sucuri.net) and the Sucuri SiteCheck scanner will check the website for known malware, blacklisting status, website errors, and out-of-date software.
File Analyzer detects and analyses potential malicious executables such as:
.exe (Executables, GUI, CUI, and all variants like PIF, SCR, CPL etc)
.dll (Dynamic Link Libraries)
.vbs (Script files like JS, JSE, VBS, VBE, PS1, PS2, CHM etc)
.any (Available in Pro Version)
File Analyzer is based on Joe Sandbox Desktop which performs deep malware analysis. Compared to others Joe Sandbox performs static, dynamic, graph and hybrid analysis to get the most in-depth analysis possible. The captured behavior is rated and classified by one of the biggest behavior signature sets.
What about evasive malware? Joe Sandbox Desktop is the only solution which uses novel graph based algorithms to detect and spot evasive behavior. Checkout the behavior and execution graphs in the reports. To leave malware no choice for VM detection Joe Sandbox Desktop enables to analyze on bare-metal machines (e.g. on a Laptop or PC from your environment).
This video show how to developp a complete application within Qradar using the new Qradar Application Editor
Suricata is a free and open source, mature, fast and robust network threat detection engine. The Suricata engine is capable of real time intrusion detection (IDS), inline intrusion prevention (IPS), network security monitoring (NSM) and offline pcap processing.
Suricata inspects the network traffic using a powerful and extensive rules and signature language, and has powerful Lua scripting support for detection of complex threats. With standard input and output formats like YAML and JSON integrations with tools like existing SIEMs, Splunk, Logstash/Elasticsearch, Kibana, and other database become effortless. Suricata’s fast paced community driven development focuses on security, usability and efficiency.
The Suricata project and code is owned and supported by the Open Information Security Foundation (OISF), a non-profit foundation committed to ensuring Suricata’s development and sustained success as an open source project.
This webpage is a free malware analysis service powered by Payload Security that detects and analyzes unknown threats using a unique Hybrid Analysis technology.
This free malware analysis service is running VxStream Sandbox v6.70 in the backend. Supporting PE, Office, PDF, APK files and more (e.g. EML). Maximum upload size is 100 MB.
THE TECHNOLOGIES LISTED BELOW were developed within the National Security Agency (NSA) and are now available to the public via Open Source Software (OSS). The NSA Technology Transfer Program (TTP) works with agency innovators who wish to use this collaborative model for transferring their technology to the commercial marketplace. OSS invites cooperative development of technology, encouraging broad use and adoption. The public benefits by adopting, enhancing, adapting, or commercializing the software. The government benefits from the open source community’s enhancements to the technology.