TransformTool – the encoding multi-tool

TransformTool – the encoding multi-tool

 
TransformTool lets you easily work with a number of inputs, and enables you to apply a series of operations to each input. You can install it with a click of button, and it will install and run for unprivileged users as long as the .Net framework (3.5) is available. TransformTool is built with security in mind, since debugging sometimes can involve production data or otherwise sensitive information.

TransformTool currently supports the following transformations:
HTML Encode/Decode
XML Escape/Unescape
URL Encode/Decode
URL Encode Unicode
URL Encode/Decode raw bytes
Base 64 Encode/Decode
HEX Encode/Decode
Charsets (ASCII, Latin-1, UTF-8, UTF-16)
Deflate/Inflate
GZip/GUnzip
Common hash functions (MD5, SHA-1, SHA-256, SHA-384, SHA-512, RIPEMD-160)

Download: http://transformtool.codeplex.com

Advertisements

Kaspersky Anti-Virus Source Code Leaks Online

Kaspersky Anti-Virus Source Code Leaks Online


It seems that the source code for one of Kaspersky’s security suite products has been leaked online and is available for download from torrent and file hosting websites.

According to a description accompanying the release, the sources were stolen from Kaspersky Lab in 2008 and the last changes made to them date from December 2007.
The code is written in C++ and Delphi and covers the anti-virus engine, as well as the anti-phishing, anti-dialer, anti-spam, parental control, and other modules.
We don’t know yet to what version of Kaspersky’s security suite the sources actually correspond to, but 8.0 is the most likely candidate at this point.
The Russian vendor’s line of products is now at version 11.0, which is publicly marketed as 2011 and PURE, for the most complete offering.

More Info: http://news.softpedia.com

Download Source Code via Torrent: http://thepiratebay.org

Direct Download: http://vx.netlux.org or http://www.opensc.ws

Be careful !

Update:

Former Kaspersky Employee Responsible for Leaked Source Code

Update 2

Kaspersky Confirms Source Code Leak, Threatens Legal Action Against Downloaders

Infringement Notice from Kaspersky

Bypassing Internet Explorer’s XSS Filter

Bypassing Internet Explorer’s XSS Filter

Traps Of Gold – Defcon 2011

By default Internet Explorer 9 has a security system to help prevent Reflective XSS attacks. There are well known shortfalls of this system, most notably that it does not attempt to address DOM based XSS or Stored XSS. This security system is built on an arbitrary philosophy which only accounts for the most straight forward of reflective XSS attacks[1]. This paper is covering three attack patterns that undermine Internet Explorer’s ability to prevent Reflective XSS. These are general attack patterns that are independent of Web Application platform.

Download PDF: https://sitewat.ch

Updates: Autoruns v11, Coreinfo v3.01, ProcDump v4.01 and Process Explorer v15.05

Updates: Autoruns v11, Coreinfo v3.01, ProcDump v4.01 and Process Explorer v15.05

Autoruns v11: This update to Autoruns, a GUI and command-line tool that lists executables configured to run when you boot, logon or run common applications, adds a “jump to folder” command and several additional autostart locations. The command-line version, Autorunsc, adds a new switch to show file hashes and an option to display the autostart entries for all user accounts registered on a system.

Coreinfo v3.01: This update to Coreinfo, a command-line utility that shows processor features and topology, fixes a bug in the way it reports hyper-threading and gives a warning when showing virtualization features and a hypervisor is running.

ProcDump v4.01: This release of ProcDump, a tool for capturing process memory dumps, adds a context record for 1st chance exception dumps so that registers and the call stack of the faulting thread are captured.

Process Explorer v15.05: This update fixes a bug in cycle CPU usage calculation on Windows 7.

source: blogs.technet.com

DarkComet-RAT V4.0 Fix 1 Released

DarkComet-RAT (Remote Administration Tool) is software design to control in the best condition and confort possible any kind of Microsoft Windows machine since Windows 2000.This software allow you to make hundreds of functions stealthly and remotely without any kind of autorisation in the remote process.This software is a long time project , started the August 2008 , DarkComet-RAT is now one of the best and one of the most stable RAT ever made and totally free.

One of the most usefull thing in this version is the local database, keylogger logs, users, groups etc are now fully synchronized with the local db using sqlite (very fast and stable).Keylogger is now more efficient, logs are sorted by days and don’t worry if the remote user delete the logs, you still can watch them (a little database icon apear that means their are synchronized with the database).Take a look at the Change log for all improvements!

Download: http://www.darkcomet-rat.com