Provide a fast way to delete entries from OpenSSH's known_hosts
file. This is a simple automation of the things normally done by
the user when having an "offending key" in his/her known_hosts file
caused by a changing host key of the destination.
Vinetto extracts the thumbnails and associated metadata from the Thumbs.db
files.
The Windows systems (98, ME, 2000, XP and 2003 Server) can store thumbnails
and metadata of the picture files contained in the directories of its FAT32
or NTFS filesystems.
The thumbnails and associated metadata are stored in Thumbs.db files.
The Thumbs.db files are undocumented OLE structured files.
Once a picture file has been deleted from the filesystem, the related thumbnail
and associated metada remain stored in the Thumbs.db file. So, the data
contained in those Thumbs.db files are an helpful source of information
for the forensics investigator.
Wapiti allows you to audit the security of your web applications.
It performs "black-box" scans, i.e. it does not study the source code of
the application but will scans the webpages of the deployed webapp,
looking for scripts and forms where it can inject data.
Once it gets this list, Wapiti acts like a fuzzer, injecting payloads to
see if a script is vulnerable.
Wipe is a file and block device wiping utility.
Yersinia is a layer 2 vulnerability scanner with support for the
following protocols:
Cisco Discovery Protocol (CDP)
Dynamic Host Configuration Protocol (DHCP)
Dynamic Trunking Protocol (DTP)
Hot Standby Router Protocol (HSRP)
IEEE 802.1q
Spanning Tree Protocol (STP, RSTP)
Virtual Trunking Protocol (VTP)
Webfwlog is a flexible web-based analysis and reporting tool for firewall
logs. It supports log files in standard ipfilter or ipfw format.
With Webfwlog you can design reports to use on your firewall logs in whatever
configuration you desire. Included are example reports as a starting
point. You can sort a report with a single click, "drill-down" on the reports
all the way to the packet level, and save your reports for later use. You can
also create a link directly to any saved report.
Webfwlog requires a web server with PHP support and a MySQL or PostgresSQL
database server.
Iron Bars Shell is a restricted Unix shell. The user can not step out of, nor
access files outside the home directory. It is written in C for Linux. No
libraries used. It is small, fast, secure. Two ascii configuration files for
more control.
The .tcshrc project creates a set of configuration scripts for the
TCSH shell. These scripts exploit the most advanced features of tcsh.
viewglob is an utility designed to complement the Unix shell in
graphical environments. It has two parts:
1. A tool that sits as a layer between the shell and X terminal,
keeping track of the user's current directory and command line.
2. A graphical display which shows the layouts of directories
referenced on the command line (including pwd).
The display reveals the results of file globs and expansions as they
are typed (hence the name), highlighting selected files and potential
name completions.
It can also be used as a surrogate terminal, where keystrokes typed in
the display are passed to the shell. Files and directories can be
double-clicked to insert their names and/or paths into the terminal.
Wcd is a command-line program to change directory fast. It saves time typing
at the keyboard. One needs to type only a part of a directory name and wcd
will jump to it. Wcd has a fast selection method in case of multiple matches
and allows aliasing and banning of directories. Wcd also includes a full
screen interactive directory tree browser with speed search.