We are constantly working on new tools and applications to assist your business with IT security. Please feel free to download any of the tools below or get in contact for more information.


Secure Email: MS Outlook 2007, 2010, 2013, 2016 PGP Plugin.

This tool is open source and was not compiled or developed by us (please respect the rightful owners) and it's a tool that we use to secure email between ourselves and clients.  The tool uses the opensource GNU PGP backend to handle the encryption along with Kleopatra for the key management and an Outlook plugin from dejavusecurity.

Download from here


Our Tools



NFCapture is an Android application that detects an NFC card and makes a network connection to obtain commands (APDUs) to run on that card. The application replaces LS_NFC_Client and can perform both card reads, card emulation and MITM between two phones. By running python on the Android phone, an external PC is no lnoger required.

Released 18/11/12



LS_NFC_CLient is an Android application that detects an NFC card and makes a network connection to obtain commands (APDUs) to run on that card. It works by registering an intent for detection of ISODEP NFC cards, and then connecting to the server defined in the nfc_settings.txt file in the root of the external storage.

Released 6/11/11



PyAndroid is python code to enable an Android phone with LS_NFC_Client installed to be used as an RFIDIOt reader.

Released 6/11/11



Logger is a JCOP applet designed to help with reviewing smartcard applications. It has two distinct functions:

  • Logger. The applet logs every APDU request into a log array and allow you to retreive them.
  • Responder. The applet has the ability to set responses to APDUs on the fly so you can easy use the card to emulate other applets.


Released 30/11/09



RFIDIOt-nvd is a version of RFIDIOt with support for Snapper feeders provided through libnfc.

Released 30/11/2009.



BotSearch is a tool written (in python) to attempt to identify New Zealand (or other country TLD) sites that have been compromised and are serving up malware. It does this by utilising search engines to identify potential sites and then checking those sites for malware injection strings. The script outputs to an XML file and tracks the first and last times each URL was seen both live and by the search engines.

Changes in version 0.4 include:

  • Capturing of data input sources
  • Segregation of components into separate scripts for maintenance and ease of use
  • Threaded searching
  • Addition of MS Live search engine
  • Use of the GSB API rather than web page
  • Many other code improvements


Released 25/05/09