Tag Archives: Security Tools

Advanced Password Recovery Tool (Hash Cat)

Hash Cat Features Multi-Threaded Free Multi-Hash (up to 24 million hashes) Multi-OS (Linux & Windows native binaries) Multi-Algo (MD4, MD5, SHA1, DCC, NTLM, MySQL, …) SSE2 accelerated All Attack-Modes except Brute-Force and Permutation can be extended by rules Very fast Rule-engine Rules compatible with JTR and PasswordsPro Possible to resume or limit session Automatically recognizes recovered hashes from outfile at startup Can automatically generate random rules Load saltlist from external file and then use them in… Read More »

Researcher releases smart meter hacking tool

Source: Computerworld by Jaikumar Vijayan In this article “Security consulting firm SecureState today released a new open source hacking tool that it claims will let security researchers and penetration testers verify the security of electric utility smart meters being installed in millions of homes around the country. The tool, called Termineter, is available for public download from SecureState’s website… Read More »

Real-time alert system shows active cyber attacks in 3D

Source: Help Net Security In this article “A solution to the problem of how to spot cyber attacks on a network as soon as they have begun might just be coming from Japan, reports DigInfo TV. Researchers from the country’s National Institute of Information and Communications Technology (NICT) have recently revealed a real-time network monitoring system that is… Read More »

Cleipperz Online Password Volt

What does Clipperz do? You can think of Clipperz as your web Rolodex, a card index where you can enter any sort of confidential data without worrying about security. It can be used to store and freely organize passwords, confidential notes, burglar alarm codes, credit and debit card details, PINs, software keys, … What problem does Clipperz solve? Clipperz does solve the… Read More »

safe3si Sql Injection Tool

Safe3SI is one of the most powerful and easy usage penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a kick-ass detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching… Read More »