Loading...

Menu

ORBIT SYSTEMS PROPERTY MANAGER

Orbit Systems Property Manager is a cloud hosted property managment software designed for the hospitality industry. The software is able to manage reservations, accounts, and rooms. It is also capable of generating daily houskeeping reports and daily and monthly financial reports.

The software can be customized for fit your specific needs and can be integrated into a front end website to allow your guests to make their own reservations without needing to pay a third party. If you would like more information or to purchase a copy please contact Zachary Williams

Software Features

  • Magnetic Stripe Reader Integration
  • Automated Email Notifications
  • PDF Invoice Generation
  • Banned Customer List
  • Account Search by Name or Phone
  • Manage Payments & Charges
  • Daily & Monthly Reports
  • Employee Account Managment
  • Corporate Customer Managment
  • Room Status Managment
  • Housekeeping Reports
  • And Much More!

This software is in active development and is available for purchase for $5,000 CDN + $500/yr for Hosting.
Includes: Training & Direct Support from the Developer

>> Live Demo <<
Username: demo / Password: demo

Software Login Screen
OSPM Dashboard Screen
OSPM Settings Screen
OSPM Edit Unit Screen

ATTACK VECTOR SECURITY SOFTWARE

Attack Vector is a Wireless and LAN Network Attack script I wrote for BackTrack 3 and later updated for use with BackTrack 4. I was working on updating it for compatability with BackTrack 5 when my first child was born. I have since retired all work on this project and it is no longer maintained or updated. The script allows one to scan, index and attack wireless and wired networks. Including such things as Secure Socket Layer MITM attacks, Wireless Encryption Code Cracking, Denial of Service, and Password Cracking.

The script was designed to facilliate easy use of complex command line attacks such as:

Function Breakdown

  • Wireless Interface Manipulation
    • Enable Monitor Mode
    • Disable Monitor Mode
    • Create Managed Mode
    • Destroy Managed Mode
  • Wireless Network Connections
    • WPA Connect
    • WEP Connect
    • Disconnect
  • Wireless Network Scanning
    • Kismet
    • FIFO (First In First Out)
    • RRobin (Round Robin)
    • HOL (Hop on Last)
    • AP-Specific (Access Point Specific)
    • Reveal-Hidden
  • Target Selection
    • Set
    • View
    • Change
    • Save
    • View Log
    • Set From Logs
    • Remove-Log-Entry
  • Wired and Wireless Attacks
    • LAN
      • SSLM (Secure Socket Layer Man-in-the-Middle)
      • SSHM (Secure Shell Host Man-in-the-Middle)
      • PTM (Plain Text Man-in-the-Middle)
      • Just Capture
    • DoS
      • AP-DeAuth (Access Point DeAuth)
      • CL-DeAuth (Client De-Auth)
  • WEP
    • DeAuth (DeAuthentication)
    • FakeAuth (Fake Authentication)
    • Fragmentation
  • WPA
    • Attack
    • PairWise Master Key Managment (Rainbow Tables)
      • ListDB
      • Import-Passwds
      • Import-ESSID
      • Clean
      • Verify
      • Process
      • Stats
    • Crack
  • Data Decoding
    • SSL-Decoder
    • WEP-Decoder
    • WPA-Decoder
  • LAN Scanning
    • Nmap
    • SNMP
  • MAC Address Manipulation
    • Change
    • View
  • Wireless Driver Manipulation
    • Display
    • Change