Articles by "TOOLS"
Showing posts with label TOOLS. Show all posts

Markdown Text Editor
Editor Teks untuk Format Markdown

Pembuatan perpustakaan JavaScript ini dikhususkan untuk menangani aplikasi-aplikasi editor teks berbasis elemen <textarea>. Target awal ingin Saya jadikan sebagai pendukung aplikasi editor teks Markdown, tapi Anda juga bisa menggunakan ini untuk membuat aplikasi editor teks sekelas MarkItUp! jika mau:
Unduh Berkas Lihat Dokumentasi

Demo

  • HTML Text Editor
  • Markdown Text Editor
  • Functions Test
NB: Butuh judul posting berbahasa Indonesia untuk ini.


KAOSDISTRO.WEB.ID



css3 button generator

Aplikasi ini sebenarnya adalah pengembangan sederhana yang Saya lakukan dari konsep CSS3 Button Maker buatan Chris Coyier. Di sini Saya telah menambahkan beberapa elemen variabel yang sangat penting bagi pengguna yang tidak dihadirkan dalam versinya. Aplikasi ini sangat bermanfaat bagi Anda yang tidak suka menulis kode, atau bahkan bagi yang tidak mengerti sama sekali. Anda bisa mengunduh aplikasi ini dengan cara mengeklik tombol ini:

Download Aplikasi Download Versi Terbaru

Cukup dengan mengatur variabel-variabelnya sampai Anda mendapatkan hasil tampilan button yang menurut Anda paling baik. Dengan apikasi ini, bukan hanya satu atau dua konsep Tombol CSS3 yang bisa Anda buat, namun puluhan bahkan ratusan konsep!

Letakkan kode CSS yang tergenerasi ke dalam kode HTML templatemu, kemudian untuk memanggil kode CSSnya jangan lupa untuk menambahkan atribut berupa class="tombol" pada elemen yang Anda buat seperti ini:

<button class="tombol">Nama Tombol Anda</button>

Semoga aplikasi ini dapat membantu mempermudah pekerjaan Anda.


KAOSDISTRO.WEB.ID


no image
“The goal of Xplico is extract from an internet traffic capture the applications data contained.
For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP), FTP, TFTP, and so on. Xplico isn’t a network protocol analyzer. Xplico is an open source Network Forensic Analysis Tool (NFAT).
Xplico is released under the GNU
no image
Kernel-2.6.18.194 / e15 / 2010 Local Root Exploit !



====================================================
kernel-2.6.18.194 */*e15 */* 2010 Local Root Exploit
====================================================

# Author: Hackeri-AL
# Email : h-al [at] hotmail [dot] it
# Group : UAH / United ALBANIA Hackers
# Web : uah1.org.uk
# Greetz: LoocK3D - b4cKd00r ~


Exploit : http://1337db.com/
no image
“DEFT is a new concept of Computer Forensic live system that uses LXDE as desktop environment and thunar file manager and mount manager as tool for device management.It is a very easy to use system that includes an excellent hardware detection and the best free and open source applications dedicated to incident response and computer forensics.“
These are the main features of DEFT RC v6:
no image
SilentEye is a cross-platform application design for an easy use of steganography, in this case hiding messages into pictures. It provides a pretty nice interface and an easy integration of new steganography algorithm and cryptography process by using a plug-ins system.

Cryptography plug-ins: Allow application to encrypt data before hiding them, for example using AES 128.
Image format
no image
“S-E Ninja is a Social Engineering tool, with 20-25 popular sites fake pages and anonymous mailer via mail() function in PHP. It is a Phishing Web Application Written in PHP,XHTML,CSS,JS.”



This is the official change log:
Edited tables names
Added XSS stealer module
Now you got control of ip_capture module auto re-direction. Check out config.php.
New module_lib functions
Fixed
no image
“JavaSnoop is a tool that lets you intercept methods, alter data and otherwise hack Java applications running on your computer."



This is the change log for the current release:
Added granular logging on the agent (still controlled by the main UI menu)
Fixed Jython/BeanShell bug (had to remove scripting jars from bootclasspath and add them to the system classpath at runtime with
no image
“Dradis is a tool for sharing information during security testing. While plenty of tools exist to help in the different stages of the test, not so many exist to share interesting information captured. When a team of testers is working on the same set of targets, having a common repository of information is essential to avoid duplication of efforts.”


This is the official change
no image

A short post for Ravan this time. It is a JavaScript based Distributed Computing system that can perform brute force attacks on salted hashes by distributing the task across several browsers. Salted and plain versions of the following hashing algorithms are currently supported:MD5
SHA1
SHA256
SHA512
How to use?Using Ravan is very simple, just follow these steps:

Go to http://www.andlabs.org/
no image
HTTPS Everywhere is a Firefox extension produced as a collaboration between The Tor Project and the Electronic Frontier Foundation. It encrypts your communications with a number of major websites.The EFF launched a new version of HTTPS Everywhere, a security tool that offers enhanced protection for Firefox browser users against Firesheep and other exploits of webpage security flaws.HTTPS secures
no image
Armitage is a graphical cyber attack management tool for Metasploit that visualizes your targets, recommends exploits, and exposes the advanced capabilities of the framework. Armitage aims to make Metasploit usable for security practitioners who understand hacking but don’t use Metasploit every day. If you want to learn Metasploit and grow into the advanced features, Armitage can help us.

no image
The OWASP HTTP Post Tool allows you to test your web applications to ensure its stability from HTTP GET and HTTP POST attacks. This tool was programmed by the author to over come the short comings of other HTTP attack tools such as Slowloris and PyLoris. In other words this QA tool was created to allow you to test your web applications to ensure its stability from HTTP GET and HTTP POST
no image
“Fiddler is a Web Debugging Proxy which logs all HTTP(S) traffic between your computer and the Internet. Fiddler allows you to inspect all HTTP(S) traffic, set breakpoints, and “fiddle” with incoming or outgoing data. Fiddler includes a powerful event-based scripting subsystem, and can be extended using any .NET language. Fiddler is freeware and can debug traffic from virtually any
no image
Sometimes you got to access devices that are behind a firewall or protected networks. You could do that via VPNs etc. You can also use Yaler, that requires minmal setup! All it takes is a few lines of code make your embedded system or mobile device accessible behind a firewall, a NAT or a mobile network gateway!
It can allow you to monitor and remote control devices from any web browser
no image
TrendLabs has created a STUXNET Scanner Tool to help administrators with clues to determine which computers in their networks are still infected by STUXNET. This tool helps administrators identify infected machines within their own networks even if STUXNET is not communicating as STUXNET installs both server and client components for a Remote Procedure Call in infected computers in order
no image
Having your IP address considered as private from a legal point of view, it is always interesting to increase your on-line privacy. Not only to hide your illegal activity indeed for most politicians and anti-fraud organizations, behind each surfers lives, but to just keep your personal information away from marketing companies. Think about the search engines which build your profile based
no image
“Arachni is a feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.“


This is the official change log:
Major performance improvements
Major system refactoring and code clean-up
Major module API refactoring providing even more flexibility regarding element auditing and manipulation
no image
After being in production for almost 3 months, BackTrack has been updated – yet again! It has been aptly code named – “Nemesis“.

“BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Regardless if you’re making BackTrack your primary operating system, booting from a
no image
Web Crawler is a open source application that is based on the WebEngine library. WebEngine is the set of tools for performing black-box web-sites testing and other similar tasks. It provides tools means for reception of documents from a web-server, parse HTML pages, their comparisons, search through pages sources and DOM-structure, sandboxed execution of the java-scripts and vb-scripts.