We develop tools and services that we offer publicly to help activists and journalists to protect themselves from digital threats. Following are some of the projects we work on. If are not familiar with these tools and their purpose, we suggest you first check out our Resources page.
Hardentools is a collection of simple utilities designed to disable a number of "features" exposed by operating systems (Microsoft Windows, for now), and primary consumer applications. These features, commonly thought for Enterprise customers, are generally useless to regular users and rather pose as dangers as they are very commonly abused by attackers to execute malicious code on a victim's computer.
The intent of this tool is to simply reduce the attack surface by disabling the low-hanging fruit. Hardentools is intended for individuals at risk, who might want an extra level of security at the price of some usability. It is not intended for corporate environments and it is not a replacement for antiviruses, patching, security suites and other countermeasures. The tool is currently under development, so use at your own risk.
Snoopdigg is a simple tool to automate some basic steps to acquire some evidence of compromise from Windows computers. Snoopdigg is normally intended for trainers, researchers, and incident responders without a particular background in information security and computer forensics.
Snoopdigg doesn't require any configuration or parameters, it just needs to be executed with Administrator privileges. Once launched, the software automatically harvests and collects copies of the Windows executables that maintain persistence on the system, and afterwards attempts at taking a full snapshot of the memory.
Snoopdroid is a simple Python utility to automatically extract all available Android applications installed on an Android device connected to your computer through USB debugging. It simplifies the process to extract .apk files, optionally look them up on services such as VirusTotal and Koodous, and later inspect them, for example in order to identify any potential malicious application.