Αναρτήσεις

Cloud Client Side File Encryption: Cryptomator

Εικόνα
Multi-platform transparent client-side encryption of your files in the cloud. Cryptomator provides transparent, client-side encryption for your cloud. Protect your documents from unauthorized access. Cryptomator is free and open source software, so you can rest assured there are no backdoors. Cryptomator encrypts file contents and names using AES . Your passphrase is protected against bruteforcing attempts using scrypt . Directory structures get obfuscated. The only thing which cannot be encrypted without breaking your cloud synchronization is the modification date of your files. Cryptomator encrypts files and doesn’t care where you store them. This makes it a lightweight application, which we believe is a huge benefit for reliability. Cryptomator is a so-called transparent encryption utility. This means that you don’t have to learn new workflows. Just work with your files as you’re used to. Cryptomator is a free and open source software licensed under the MIT / X Consortium Licens

Unique Discrete Event Network Simulator: Shadow

Εικόνα
Shadow is a unique discrete-event network simulator that runs real applications like Tor and Bitcoin, and distributed systems of thousands of nodes on a single machine. Shadow combines the accuracy of emulation with the efficiency and control of simulation, achieving the best of both approaches. Shadow was developed because there was a recognized need for an accurate, efficient, and scalable tool for Tor experimentation: using the PlanetLab platform is undesirable due to management overhead and lack of control; existing emulators are far too inefficient when scaling to thousands of nodes; roll-your-own simulators are often too inaccurate or generic to be useful for multiple projects; and experiments on the live Tor network are often infeasible due to privacy risks. The goal for Shadow was to provide a tool that can be used by anyone with a Linux machine or access to EC2 to hasten the development of research prototypes and reduce the time to deployment. Although originally written wi

DNS Diagnostics & Performance Measurement Tools: DNSDiag

Εικόνα
Ever been wondering if your ISP is hijacking your DNS traffic ? Ever observed any misbehavior with your DNS responses? Ever been redirected to wrong address and suspected something is wrong with your DNS? Here we have a set of tools to perform basic audits on your DNS requests and responses to make sure your DNS is working as you expect. You can measure the response time of any given DNS server for arbitrary requests using dnsping . Just like traditional ping utility, it gives you similar functionality for DNS requests. You can also trace the path your DNS request takes to destination to make sure it is not being redirected or hijacked. This can be done by comparing different DNS queries being sent to the same DNS server using dnstraceroute and observe if there is any difference between the path. dnseval evaluates multiple DNS resolvers and helps you choose the best DNS server for your network. While it is highly recommended to use your own DNS resolver and never trust any third

Massive SQL Injection Scanner: SQLiv

Εικόνα
This tool will give you the SQLi Vulnerable Website Just by Adding the Dork. Features multiple domain scanning with SQL injection dork by Bing, Google, or Yahoo targetted scanning by providing specific domain (with crawling) reverse domain scanning Note : Both SQLi scanning and domain info checking are done in multiprocessing so the script is super fast at scanning many urls Installation git clone http://ift.tt/2ixK0rq sudo python2 setup.py -i Dependencies bs4 termcolor google Examples Multiple domain scanning with SQLi dork it simply search multiple websites from given dork and scan the results one by one python sqliv.py - d < SQLI DORK > - e < SEARCH ENGINE > python sqliv.py - d " inurl:index.php?id= " - e google Targetted scanning can provide only domain name or specifc url with query params if only domain name is provided, it will crawl and get urls with query then scan the urls one by one python sqliv.py - t < URL >

Government to begin process to crush Catalonia independence bid

Εικόνα
(CNN) The Spanish government said Thursday it would begin the process to impose direct rule on Catalonia in an unprecedented move to crush the region’s independence bid. In a statement from Madrid, the government of Prime Minister Mariano Rajoy said it would invoke Article 155 of the constitution, a provision that allows the central government to suspend the autonomy of the Catalan regional administration. Rajoy’s Cabinet will meet on Saturday to agree measures to “restore the constitutional order” in Catalonia, where a banned referendum on independence took place earlier this month. The plan will then be put before the Senate, where Rajoy’s Popular Party has a majority, for approval. The statement did not spell out what steps would be taken under Article 155, but the provision gives Madrid the power to take over the running of Catalan institutions and force new elections. It has never been invoked before. Catalan regional President Carles Puigdemont delivers a speech in Bar

France may fine catcallers

Paris (CNN) Men who catcall, harass or follow women on the street in France could face on-the-spot fines under a new sexual-abuse law planned by the country’s minister for gender equality. from WordPress http://ift.tt/2idefkf via IFTTT

UK royal baby due date announced

Set edition preference: U.S. International Confirm from WordPress http://ift.tt/2gMpyj1 via IFTTT