WPSCAN
I could not find any useful Unix command line scanners that can identify WordPress hacked files and backdoors. So, I wrote my own. This is a little program written in PERL. Just unzip it, copy it to a suitable location on your Unix host (/usr/bin, for instance) and set permissions to 0755. MD5 Checksup of Zip file: f39cf6fd726930ae358a7c8b35b8cecc

SHA512-PASS
This is a WordPress plugin that encrypts all WordPress User passwords in SHA512-Crypt format. This is much stronger than the standard WordPress mechanism. The password format is also Dovecot-compatible. This is PHP code originally written a year ago, then revamped in March 2017 due to a function collision with the WP-SpamSheild plugin. Just put this in your WordPress plugins folder, unzip, and activate. All subsequent password actions will invoke this module. Enjoy!  MD5 Checksum of Zip file: 51a2487fcd3c86a7384252668beeb0f6

REPLACESTRING
This is a Unix shell script that makes it easy to replace strings within a file. Download the file, install it to a suitable location (like /usr/bin) and set the permissions to 0755. Use quotes around strings that have unusual or special characters. MD5 Checksum: 494e0b7842a9acff9c1128d6afe387e5

IPREV
This is a tiny PERL script that takes an iPv4 argument and simply reverses the address (e.g. 127.0.0.1 becomes 1.0.0.127). Useful for manually testing RBL Black/White lists. Download the file, install it to a suitable location (like /usr/bin) and set the permissions to 0755. MD5 Checksum: 8a38d298cc89fe7af93cae83d952d848

URL BLACKLIST
This is a listing of the last 500 spamvertized URLs observed by the server. This list is automatically generated once a day at 11:00AM US Eastern Time. This information is suitable for RBLDNS systems but can be fed into the WordFence Comment filter as needed.

IP4_BLACKLIST
This is a listing of the last 500 IP addresses/address-ranges blocked due to spam.  This list is automatically generated once a data at 11:00AM US Eastern Time.  This information is suitable for use by RBLDNS systems.

TLS/SSL SIEVE AUTORESPONDER TEST
This allows an Email client elsewhere on the Internet to Email this autoresponder, which then responds to the client with an Email describing the TLS/SSL transport security that was used.  To see it in use, simply send a blank Email to: autotest@jaredsec.com.

This Sieve script is compatible with Pigeonhole Sieve but should also work fine with CMU Sieve and others.  It does require that the standard “vacation-seconds” and “variables” extensions be activated.

After downloading, make sure to change the “subject“, “myaddress“, and “serverstring” variables at the top of the file.

FAX TEST SHEET
This is a custom built FAX test sheet (in TIF format)  combining the functions of a few of the ITU test patterns.  It is useful for testing Gradients, Patterns, and Text Fonts.  Print out a couple of these sheets (fit to page) for test purposes.  

Make sure to send at least two pages when testing FAX machines.  Rather loose timing specifications associated with the End-Of-Page re-training sequences can play havoc with FAX machine compatibility; especially if there is emulation involved, like VoIP’s ITU Recommendation T.38.