Category Archives: Reviews

Auth MemCookie

Auth MemCookie are an Apache v2 authentification and authorization modules are based on cookie authentification mecanism.

IoDine – IP over DNS

This is a piece of software that lets you tunnel IPv4 data through a DNS server. This can be usable in different situations where internet access is firewalled, but DNS queries are allowed.

KeePass Password Safe

Today you need to remember many passwords. You need a password for the Windows network logon, your e-mail account, your homepage´s ftp password, online passwords (like CodeProject member account), etc. etc. etc. The list is endless. Also, you should use different passwords for each account. Because if you use only one password everywhere and someone… Read More »


FourEyes allows network administrators to enforce a four eyes policy on Windows NT, 2000 and XP by requiring two users to authenticate during a local logon.

NatACL – firewall group policy controller

NatACL is a firewall group policy controller for intranets and the Internet. It is made of 3 main programs: a DHCP server, a Web authenticator, and a statistic collector. It forces users to use a DHCP client.

Argos – Emulator for Zero-Day Attacks

Argos is a full and secure system emulator designed for use in Honeypots. It is based on QEMU, an open source processor emulator that uses dynamic translation to achieve a fairly good emulation speed.

WiFi Radar

WiFi Radar is a utility for managing, scanning, and auto-connecting to WiFi profiles. It enables you to scan for available networks and create profiles for your preferred networks. At boot time, running WiFi Radar will automatically scan for an available preferred network and connect to it. You can drag and drop your preferred networks to… Read More »


strongSwan is an OpenSource IPsec implementation for the Linux operating system. It is based on the discontinued FreeS/WAN project and the X.509 patch which we developped over the last three years. In order to have a stable IPsec platform to base our future extensions of the X.509 capability on, we decided to lauch the strongSwan… Read More »

Wapiti – Web application vulnerability scanner

Wapiti allows you to audit the security of your web applications. It performs “black-box” scans, i.e. it does not study the source code of the application but will scans the webpages of the deployed webapp, looking for scripts and forms where it can inject data. Once it gets this list, Wapiti acts like a fuzzer,… Read More »

SQLBrute – Blind SQL Injection

SQLBrute is a tool for brute forcing data out of databases using blind SQL injection vulnerabilities. It supports time based and error based exploit types on Microsoft SQL Server, and error based exploit on Oracle. It is written in Python, uses multi-threading, and doesn´t require non-standard libraries.