AI Stuff
AI Profile Picture Maker – Free Our AI will create a fantasy profile picture for you for free, using similar technology to Lensa Magic Avatars and AI Time Machine (from MyHeritage) which turns selfies into digital avatars. What we offer is like those paid services, but free. | ChatGPT ChatGPT (Generative Pre-trained Transformer)[2] ist ein Chatbot, der künstliche Intelligenz einsetzt, um mit Nutzern über textbasierte Nachrichten zu kommunizieren. Er nutzt moderne maschinelle Lerntechnologie, um Antworten zu generieren, die natürlich klingen und für das Gespräch relevant sein sollen. Den Chatbot entwickelte das US-amerikanische Unternehmen OpenAI mit Sitz in Kalifornien, das ihn im November 2022 veröffentlichte. |
DALL-E DALL-E and DALL-E 2 are deep learning models developed by OpenAI to generate digital images from natural language descriptions, called "prompts". DALL-E was revealed by OpenAI in a blog post in January 2021, and uses a version of GPT-3 modified to generate images | Deppl DeepL verwendet wie andere moderne Übersetzungsdienste neuronale Netze, die mittels einer großen Menge von frei verfügbaren Sprachübersetzungen trainiert werden |
Iconfactory Freeware Archive Our freeware is only for personal use and all copyrights remain the property of their respective holders. | Tome A collaborative AI partner at your fingertips. |
Anonymity
Tor Tor is a network of virtual tunnels designed to improve privacy and security on the Internet by routing your requests through a series of intermediate machines. |
Compliance
Bundesgesetz über den Datenschutz 1992 Dieses Gesetz bezweckt den Schutz der Persönlichkeit und der Grundrechte von Personen, über die Daten bearbeitet werden. | Bundesgesetz über den Datenschutz 2023 Dieses Gesetz bezweckt den Schutz der Persönlichkeit und der Grundrechte von natürlichen Personen, über die Personendaten bearbeitet werden. |
Federal Act on Data Protection This Act aims to protect the privacy and the fundamental rights of persons when their data is processed | Nationales Zentrum für Cybersicherheit Das Nationale Zentrum für Cybersicherheit (National Cyber Security Centre – NCSC) ist das Kompetenzzentrum des Bundes für Cybersicherheit und damit erste Anlaufstelle für die Wirtschaft, Verwaltung, Bildungseinrichtungen und die Bevölkerung bei Cyberfragen. |
Verordnung über den Datenschutz Schweiz 2022 Zur Gewährleistung einer angemessenen Datensicherheit müssen der Verantwortli- che und der Auftragsbearbeiter den Schutzbedarf der Personendaten bestimmen und die im Hinblick auf das Risiko geeigneten technischen und organisatorischen Mass- nahmen festlegen. |
Computer Forensic
Autopsy® Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It is used by law enforcement, military, and corporate examiners to investigate what happened on a computer. You can even use it to recover photos from your camera's memory card. | Maltego Maltego is a forensics and data mining application. It is capable of querying various public data sources and graphically depicting the relationships between entities such as people, companies, web sites, and documents |
Sleuth Kit The Sleuth Kit® (TSK) is a library and collection of command line tools that allow you to investigate disk images. The core functionality of TSK allows you to analyze volume and file system data. The library can be incorporated into larger digital forensics tools and the command line tools can be directly used to find evidence. |
Developer Stuff
Adafruit Adafruit was founded in 2005 by MIT engineer, Limor "Ladyada" Fried. Her goal was to create the best place online for learning electronics and making the best designed products for makers of all ages and skill levels. | DockerHub Docker Hub is the world's largest library and community for container images |
GitHub Harnessed for productivity. Designed for collaboration. Celebrated for built-in security. Welcome to the platform developers love. | Raspberry Pi Foundation The Raspberry Pi Foundation is a UK-based charity with the mission to enable young people to realise their full potential through the power of computing and digital technologies. |
Emulators
DOSBox DOSBox is a free and open-source emulator of an Intel x86 personal computer designed for the purpose of running software created for disk operating systems on IBM PC compatibles, primarily DOS video games. It was first released in 2002, when DOS technology was becoming obsolete. It is notable for its widespread use for running DOS games, as well as being used in commercial rereleases of those games. | Parallels Desktop für Mac Ganz gleich, ob Sie Windows-Programme ausführen müssen, die keine Mac-Versionen haben, oder ob Sie von einem PC auf einen Mac wechseln und Ihre Daten übertragen müssen, Parallels Desktop bietet Ihnen alles, was Sie brauchen. |
Proxmox Proxmox VE is a complete open-source platform for enterprise virtualization. With the built-in web interface you can easily manage VMs and containers, software-defined storage and networking, high-availability clustering, and multiple out-of-the-box tools on a single solution. | VirtualBox VirtualBox is a powerful x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. Not only is VirtualBox an extremely feature rich, high performance product for enterprise customers, it is also the only professional solution that is freely available as Open Source Software under the terms of the GNU General Public License (GPL) version 2. See "About VirtualBox" for an introduction. |
Hacker Tools
Adafruit Adafruit was founded in 2005 by MIT engineer, Limor "Ladyada" Fried. Her goal was to create the best place online for learning electronics and making the best designed products for makers of all ages and skill levels. | Awesome Flipperzero A collection of Awesome resources for the Flipper Zero device. |
Code Server Not really a hacker tool, but usefull to develop hacker tools 😉 | Flipper Zero Flipper Zero is a portable multi-tool for pentesters and geeks in a Tamagotchi-like body. |
Hak5 Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning podcasts, leading pentest gear, and inclusive community – where all hackers belong | John the Ripper John the Ripper is an Open Source password security auditing and password recovery tool available for many operating systems |
Kali Linux Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing.It is maintained and funded by Offensive Security | L0phtCrack L0phtCrack is a password auditing and recovery application originally produced by Mudge from L0pht Heavy Industries. It is used to test password strength and sometimes to recover lost Microsoft Windows passwords, by using dictionary, brute-force, hybrid attacks, and rainbow tables |
Metasploit Metasploit helps security teams do more than just verify vulnerabilities, manage security assessments, and improve security awareness; it empowers and arms defenders to always stay one step (or two) ahead of the game. | NetCat Swiss Army knife utility to write and read data across TCP and UDP network. |
Nmap Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing. | nmap Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. |
Pi-Shop (CH) Nr. One for Everything PI in Switzerland | Raspberry Pi Foundation The Raspberry Pi Foundation is a UK-based charity with the mission to enable young people to realise their full potential through the power of computing and digital technologies. |
Tindie The hardware platform for the 21st century |
Honeypot's
HONEYD Honeyd is a small daemon that creates virtual hosts on a network. The hosts can be configured to run arbitrary services, and their personality can be adapted so that they appear to be running certain operating systems. |
IAM
GNU Privacy Guard GnuPG is a complete and free implementation of the OpenPGP standard as defined by RFC4880 (also known as PGP). GnuPG allows you to encrypt and sign your data and communications; |
IDS / IPS
Snort Snort is the foremost Open Source Intrusion Prevention System (IPS) in the world. Snort IPS uses a series of rules that help define malicious network activity and uses those rules to find packets that match against them and generates alerts for users. |
Internet Networking
Angry IP Scanner Scans local networks as well as Internet IP Range, Random or file in any format Exports results into many formats, Extensible with many data fetchers, Provides command-line interface | arpwatch Arpwatch keeps track for ethernet/ip address pairings. It syslogs activity and reports certain changes via email. Arpwatch uses pcap(3) to listen for arp packets on a local ethernet interface. |
cnlab Speedtest im Browser Mit dem cnlab Speedtest messen Internetnutzer die Qualität ihrer Internetverbindungen. Der cnlab Speedtest im Browser bietet einen schnellen Überblick zur Internetverbindung mit weniger als 200 Mbit/s Datenrate. Die Zuverlässigkeit der Messung ist aber stark abhängig von der Leistung des Rechners und des Browsers. Für zuverlässige Tests bei schnelleren Verbindungen verwendet man besser das Speedtest Programm (oder die Mobile App). Diese bieten auch detailliertere Auswertemöglichkeiten und automatische Hilfestellung bei Problemen. | EtherApe EtherApe is a graphical network monitor for Unix modeled after etherman. Featuring link layer, IP and TCP modes, it displays network activity graphically. Hosts and links change in size with traffic. Color coded protocols display. |
Ettercap Ettercap is a comprehensive suite for man in the middle attacks. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols and includes many features for network and host analysis. | GNS3 Graphical Network Simulator-3 (shortened to GNS3) is a network software emulator first released in 2008.It allows the combination of virtual and real devices, used to simulate complex networks. |
Nemesis Nemesis is a command-line network packet crafting and injection utility for UNIX-like and Windows systems. Nemesis, is well suited for testing Network Intrusion Detection Systems, firewalls, IP stacks and a variety of other tasks. As a command-line driven utility, Nemesis is perfect for automation and scripting. | Ostinato Whether you are testing circuit bandwidth, storm control, L2/L3 forwarding, QOS, load balancing, SD WAN application policies, multicast snooping or any of the other myriad things a network engineer does during his day, you need to test with traffic - in lab or production. |
p0f P0f is a tool that utilizes an array of sophisticated, purely passive traffic fingerprinting mechanisms to identify the players behind any incidental TCP/IP communications (often as little as a single normal SYN) without interfering in any way. | PuTTY PuTTY is a free implementation of SSH and Telnet for Windows and Unix platforms, along with an xterm terminal emulator. It is written and maintained primarily by Simon Tatham. |
Scapy Scapy is a powerful interactive packet manipulation libary written in Python. Scapy is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more. | tcpdump This is the home web site of tcpdump, a powerful command-line packet analyzer; and libpcap, a portable C/C++ library for network traffic capture. |
Wireshark Wireshark is the world’s foremost and widely-used network protocol analyzer. |
Mac OS X
Iconfactory Freeware Archive Our freeware is only for personal use and all copyrights remain the property of their respective holders. |
Online Tools
Arbor Networks ATLAS® global threat intelligence system Digital Attack Map is a live data visualization of DDoS attacks around the globe, built through a collaboration between Google Ideas and Arbor Networks. The tool surfaces anonymous attack traffic data to let users explore historic trends and find reports of outages happening on a given day. | Bitdefender Threat Map Anti-virus maker Bitdefender has created a threat map that features infections, attacks, and spam. Bitdefender claims that the threat map displays attacks in real-time. |
CheckPoint ThreatCloud AI ThreatCloud displays live stats, which include new attacks, the source of the attacks, and their various destinations. Another interesting feature is the “Top targets by country” feature, which offers threat stats for the past week and month, as well as the average infection rate and percentage of most frequent attack sources for some countries. | DDoS Weapons Intelligence Map A10 has created the DDoS Threat Intelligence Map to help you visualize the DDoS threat landscape and prepare for the next wave of DDoS attacks against your infrastructure. |
Deutsche Telekom Sicherheitstacho Der Sicherheitstacho zeigt die weltweiten Cyberangriffe auf die Honeypotinfrastruktur der DTAG sowie ihrer Partner an. | Fortinet Threat Map The Fortinet Threat Map features malicious network activity within various geographic regions.. In addition, this attack map will display various international sources of attack and their destinations. It may not be as visually exciting as some of the others, but it is easy to understand. |
Kaspersky Cyberthreats Realtime Map Kaspersky Lab presents its new interactive Cyberthreats Realtime Map. Living up to its name, this visual tool allows users to see what is going on in cybersecurity around the world | NETSCOUT Cyber Threat Horizon NETSCOUT Cyber Threat Horizon (Horizon) is a global cybersecurity situational awareness platform that provides organizations with highly contextualized visibility into 'over the horizon' threat activity on the landscape |
SonicWall Live Cyber Attacks Map The SonicWall Live Cyber Attacks Map provides a graphical view of worldwide attacks over the last 24 hours. It shows which countries are being attacked and where the attack originates. This interactive map shows not only malware attacks, but ransomware, encrypted traffic, intrusion attempts, and spam/phishing attacks. Also included are attack site statistics for the past 24 hours. | Sophos Threat Tracking Map SophosLabs analysts monitor and research malware, spam and web threats as they happen, around the globe. We collect what we know in these dashboards, and update them constantly as we detect new threats. You'll find threats itemized by country, volume and prevalence |
Spamhaus Attack Map Spamhaus Attack Map is displaying near-live botnet threats. While Deteque may show a few promotional tabs on screen, the visuals show the Command & Control botnet server locations as well as the areas with the most intense bot activity. | Talos Spam and Malware Map Talos Spam and Malware Map displays the top 10 cyber-attack sender lists by country as well as by top malware senders. To see more information about these senders, such as the exact IP address of the server that sent the spam/malware, hostname, the last day of the detection, and the reputation status, you can click on their names. |
Threatbutt Internet Hacking Attack Attribution Map Threat Butt features one of the coolest looking digital attack maps around, not because of a wide range of features, but because of its retro design. | World’s Biggest data breaches and hacks World’s Biggest data breaches and hacks. Regularly updated..... |
Security Tools
KeePass Password Safe KeePass is a free open source password manager, which helps you to manage your passwords in a secure way. You can store all your passwords in one database, which is locked with a master key. So you only have to remember one single master key to unlock the whole database. Database files are encrypted using the best and most secure encryption algorithms currently known (AES-256, ChaCha20 and Twofish). | Meine Google-Aktivitäten Mithilfe der gespeicherten Aktivitäten kann Google seine Dienste noch nützlicher gestalten und z. B. auf Dinge hinweisen, nach denen Sie schon einmal gesucht, die Sie schon einmal gelesen oder die Sie schon einmal angesehen haben. 😉 Haha, hier könnt Ihr Eure Google Tracker aussschalten ! |
Unix
Raspberry Pi Foundation The Raspberry Pi Foundation is a UK-based charity with the mission to enable young people to realise their full potential through the power of computing and digital technologies. |
Virj
VirusTotal VirusTotal is a web service that analyzes submitted files for known viruses and other malware. It incorporates dozens of antivirus engines from different vendors, updated regularly with new signatures. Participating antivirus vendors can get alerts when a file is not detected by their product but is by someone else's. |
Vulnerable Scanners
Greenbone OpenVAS OpenVAS is a full-featured vulnerability scanner. Its capabilities include unauthenticated and authenticated testing, various high-level and low-level internet and industrial protocols, performance tuning for large-scale scans and a powerful internal programming language to implement any type of vulnerability test. | w3af w3af is a Web Application Attack and Audit Framework. The project’s goal is to create a framework to help you secure your web applications by finding and exploiting all web application vulnerabilities. |
Wapiti Wapiti allows you to audit the security of your websites or web applications. It performs "black-box" scans (it does not study the source code) of the web application by crawling the webpages of the deployed webapp, looking for scripts and forms where it can inject data. Once it gets the list of URLs, forms and their inputs, Wapiti acts like a fuzzer, injecting payloads to see if a script is vulnerable. | Wfuzz Wfuzz is a tool designed for bruteforcing Web Applications, it can be used for finding resources not linked (directories, servlets, scripts, etc), bruteforce GET and POST parameters for checking different kind of injections (SQL, XSS, LDAP,etc), bruteforce Forms parameters (User/Password), Fuzzing,etc. |
Wireless
Aircrack-ng Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. It implements the best known cracking algorithms to recover wireless keys once enough encrypted packets have been gathered. |
[qrcode]https://www.fischerman.ch/?page_id=15[/qrcode]
Comments are closed.