oo-style framework for bash 4. Written in bash. Source and use…


  • Developer tool for generating own classes
  • Developer tool for generating own man pages for the classes
  • i18n
  • decorators for shell functions 😉
  • Use of bash autocompletion
  • Registry for environment cleanUp
  • Math methods accept args with “.” or “,” float values
  • Math methods accept args with scientific notation
  • String manipulation with special czech, slovak and slovenian characters
  • String manipulation with special french and polish and icelandic characters
  • String manipulation with special scottish gaelic, catalan and hungarian characters
  • String manipulation with special albanian, swedish, finnish, danish and norwegian characters
  • String manipulation with special spanish characters
  • String manipulation with special romanian characters and german umlauts
  • man pages
  • Manage your system processes

Download In here  | read more in here

OneClickKick (Network Boot & Kickstart)

A web based GUI for managing PXE boot. Also supports creating and serving Kickstart scripts. This provides a client install in one click. This is a generic framework created to work with anything that’s PXE bootable.


  • DHCP server configuration (redundant DHCP is an option)
  • PXE boot configuration
  • Automated unattended (kickstart) installations
  • Professional support contracts available!
  • Red Hat support
  • Fedora support
  • CentOS support
  • Ubuntu support
  • Debian support
  • Linux Mint support
  • Slackware support
  • Hardware diagnose
  • BIOS upgrades
  • LIVE environments (UBCD, etc)
  • ++ much more

Download right here
Read more in here : http://www.oneclickkick.com/

httpry v-0.1.7 released

httpry is a specialized packet sniffer designed for displaying and logging HTTP traffic. It is not intended to perform analysis itself, but to capture, parse, and log the traffic for later analysis. It can be run in real-time displaying the traffic as it is parsed, or as a daemon process that logs to an output file. It is written to be as lightweight and flexible as possible, so that it can be easily adaptable to different applications.

Changelog version 0.1.7
* added an option (-P) to specify the PID filename
* fixed compiling under OSX
* changed IPv6 parsing to follow extension headers if present
* changed rate statistics code to use a hash table data structure
* added a rps threshold option (-l) when in rate statistics mode
* changed rps display mode to -s, -t now just sets the display interval

Download Latest version : httpry-0.1.7.tar.gz

read more in here http://dumpsterventures.com/jason/httpry/

iSkim – Skim mobile devices on the go

open source project for using forensic tools to help analyze devices for potential privacy and security vulnerabilities

The iSkim tool is a small script to help forensic peeps to quickly dump all “sqlit”,”log” and “db” files.
The tool is a BETA at this moment and covers only non-jailbroken devices.

– ubuntu 11.10
– libimobiledevice and all supporting libs.

Running it
run ‘python iSkim.py’

Download latest Version : iSkim_test.py (4.5 kB)

Find Other Version | Read more in here : iSkim

UnHide – Forensics Tools to find processes and TCP/UDP ports hidden by rootkits

Unhide is a forensic tool to find processes and TCP/UDP ports hidden by rootkits / LKMs or by another hiding technique.

Platform Windows & Linux

Detecting hidden processes. Implements six main techniques :

  • Compare /proc vs /bin/ps output
  • Compare info gathered from /bin/ps with info gathered by walking thru the procfs. ONLY for Linux 2.6 version
  •  Compare info gathered from /bin/ps with info gathered from syscalls (syscall scanning).
  • Full PIDs space ocupation (PIDs bruteforcing). ONLY for Linux 2.6 version
  •  Compare /bin/ps output vs /proc, procfs walking and syscall. ONLY for Linux 2.6 version
  • Reverse search, verify that all thread seen by ps are also seen in the kernel.
  • 6- Quick compare /proc, procfs walking and syscall vs /bin/ps output. ONLY for Linux 2.6 version.

Identify TCP/UDP ports that are listening but not listed in /bin/netstat doing brute forcing of all TCP/UDP ports availables.


  • unhide.c –> Hidden processes, for generic Unix systems (*BSD, Solaris, linux 2.2 / 2.4) It doesn’t implement PIDs brute forcing check yet. Needs more testing Warning : This version is somewhat outdated and may generate false positive. Prefer unhide-linux26.c if you can use it.
  • unhide-linux26.c –> Hidden processes, for Linux 2.6.x
  • unhide-tcp.c –> Hidden TCP/UDP Ports
  • unhide_rb.c –> C port of unhide.rb (a very light version of unhide-linux26 in ruby)

Compiling :
gcc –static unhide.c -o unhide

gcc -Wall -O2 –static unhide-tcp.c -o unhide-tcp

gcc -Wall -O2 –static -pthread unhide-linux26.c -o unhide-linux26

gcc -Wall -O2 -static -o unhide_rb unhide_rb.c

Windows :
– WinUnhide
Compare info gathered from wmic command with info gathered from openprocess and Toolhelp
– WinUnhide-TCP
First it lists open TCP/UDP ports through GetTcpTable and GetUdpTable and then identify hidden ports using bind() bruteforcing

Download latest Version :

WindowsWinUnhide.zip (38.5 kB) 

Linux : unhide_20120222_beta.tgz

Or Find other version | read more in here : http://www.unhide-forensics.info

vsResolver – Alpha – DNS Validating Stub Resolver

The Validating Stub Resolver (vsResolver) is a DNS stub resolver that implements the Domain Name System Security Extensions (DNSSEC) specified in RFC 4033, RFC 4034 and RFC 4035. These add data origin authentication and data integrity to the Domain Name System. vsResolver extends the dnspython toolkit (http://www.dnspython.org/) and uses the pycrypto library for its underlying crypto implementation(https://www.dlitz.net/software/pycrypto/)


  • DNS Security Extenstions (DNSSEC) Validating Stub Resolver
  • Written in python
  • Extends dnspython, which uses pycrypto
  • Returns a query result along with a DNSSEC rating of BOGUS, PROVABLY_INSECURE or SECURE
  • negative results (e.g., NXDOMAIN) are also rated as BOGUS, PROVABLY_INSECURE or SECURE
  • See RFC4033, RFC4034 and RFC4035 for details on DNSSEC
  • Can be used as is as a utility to determine the DNSSEC status of a domain
  • Can be used as a software library to provide DNSSEC valiation to a DNS query

How to use :

c:> vsResolver.py 0 [Example]

Platform : Windows & linux

Download Latest Version : vsresolver-code.zip (86.5 kB)

Find Current Release | Read more in here : vsresolver

Xenta Framework

Xenta Framework is the extensible enterprise n-tier application framework with multilayered architecture. It is an open source project and available for free. Developed in .NET/C# programming language. Initially targeted to web based solutions. Licensed under the MIT license.

Release Notes

  • Changed solution structure
  • Changed framework architecture
  • Database normalization
  • Changed globalization, membership, security, file system, etc. subsystems
  • Removed all unnecessary client applications
  • Simplified service layer usage

Installtion guide(for developers)

  • Use the Install.sql script to install database
  • Change the data source connection string in Infrastructure.config file of the IisHost project
  • Open solution in Visual Studio 2010
  • Set the WebAdmin project as startup
  • Start debugging by pressing F5

Platform Windows

Download latest version 1.7 Betahttp://xenta.codeplex.com/

Find Other Version  Or read more in here : http://xenta.net/