CIRCLean aims to be used by someone receiving a USB key from an untrusted source who wants to see the content without opening the original and potentially malicious files. The code runs on a Raspberry Pi, which means it is never required to plug the original USB key into a computer.
POSIXplorer will help you find, navigate, and open files on Linux, Mac OS, or most POSIX systems. You just type the command and then a regex for which you'd like to search. By default, it searches filenames and excludes class and other data files. It looks recursively down from your current directory. If you'd like to search through file contents, use the '-c' flag. When using -c, after the regex, you can list a file pattern, such as * (the default) to match any file or *.java to match Java files. After searching on your query, it presents a list of results and lets you type a number to select one for opening in the editor you have defined in the EDITOR environment variable, or by default Vim. After quitting the editor, you come back to your results and can continue opening files or execute a new search. To run a new search, just type the query and the script will detect that you did not intend to enter a file number. Note that in content searches with -c, only a new content query can be entered, not a new file filter.
SQLIer takes an URL vulnerable to SQL injection attacks and attempts to determine all of the necessary information to build and exploit an SQL injection hole by itself. It requires no user interaction unless it can't guess the table/field names correctly. By doing so, it can build a UNION SELECT query designed to brute force passwords out of the database. It does not use quotes in the exploit, meaning it will work for a wider range of sites. An 8 character password (containing any character from decimal ASCII code 1-127) takes approximately one minute to crack.
WebSH is a script that executes commands on a remote machine through Web requests. This script currently only works for Unix based servers and Unix based clients. It emphasizes the fact that a vulnerability that allows a file to be edited or uploaded is just as bad as a buffer overflow of PHP or an Apache thread.
The purpose of the glideinWMS is to provide a simple way to access the Grid resources. To achieve this without reinventing the wheel, glideinWMS is a Glidein-based WMS (Workload Management System) that works on top of Condor. Once setup, final users can submit regular Condor jobs to the local queue and the glidein factory will provide the computing resources behind the scenes. From the final user point of view, the Condor pool just magically grows and shrinks as needed.
linux_ics is designed to make the process of sharing an Internet connection from a Linux computer easier for the average user. It handles configuring the interfaces, setting up NAT, and optionally running a DHCP server. In addition to Ethernet, linux_ics can also share an Internet connection over a WiFi interface in either ad-hoc or master mode.