(Page 11 of 89)   < Prev  6 7 8 9 10 11 12 13 14 15 16  Next >

Platform: Windows NT

Izemail
Added 2006-02-22
by Izecom
Encrypt and sign your e-mail messages, just by pressing the Send button in your e-mail program with Izemail. No need to exchange encryption keys or certificates, no need to go through complex enrollment procedures. The program allows you to send an encrypted and signed message, and all you need to know is their e-mail address. This program uses widespread standards for e-mail encryption such as S/MIME and PKI, making it compatible with any technology that supports S/MIME or PKI. It can read, decrypt and verify messages sent by these other systems. This program takes your message, encrypts it and delivers it to the recipient. If recipient doesn't already have an encryption key, the program makes sure they get one. Also, the software can use X.509 certificates issued by any CA that complies with PKI standards. It does not require you to use Izemail certificates.

zps
Added 2006-02-20
by zwell
It's very small(only 8k) port scanner use TCP connect , but really high-speed and strong that support nmap-style ip range and port range. So it must fit you nicely if you wanna a smallest but strange port-scanner. More information please view the help screen. Link: http://www.nosec.org/web/?q=zps

Elcomsoft Distributed Password Recovery
Added 2006-02-15
by ElcomSoft Co.Ltd.
Elcomsoft Distributed Password Recovery (EDPR) offers administrators a comprehensive solution for recovering passwords to Microsoft Office documents when employees forget or lost their passwords. EDPR lets you coordinate all of the unused computing power of every computer on your LAN or WAN, and use distributed processing to restore the lost password by installing the "agents" onto as many computers on the network as the user desires; each of these agents uses brute force to try to recover the lost password. EDPR restores passwords for Word and Excel documents encrypted with 40 bit keys (Office 97/2000 compatible) as well as more recent documents (Office XP/2003) encrypted with CSP. Office 97/2000 documents can be also decrypted by recovery of encryption keys instead of password, and that type of attack gives a guaranteed result regardless of password length and complexity.

SwitchSniffer
Added 2006-02-14
by Gordon Ahn
1. Overview SwitchSniffer is a program that can scan your switched LAN for up hosts and can reroute and collect all packets without the target users' recognition. It can also detect the ‘arpspoofer’ program running on the network and block user definable sessions like firewall. If you use this program in tandem with any sniffer program, you can capture and see the users’ IDs and passwords on a switched network. That is, SwitchSniffer enables you to monitor all the packets and all the hosts on a switch network. SwitchSniffer has the following features: -. SwitchSniffer can poll and collect all the packets on the switched LAN. -. SwitchSniffer can scan and display the active hosts on the LAN quickly, and automatically. -. While spoofing ARP tables, SwitchSniffer can act as another gateway (or ip-forwarder) without other users' recognition on the LAN.' -. It can collect and forward packets by selecting inbound, outbound, and both to be sent to the Internet. -. An ARP table is recovered automatically in about 30 seconds. But, SwitchSniffer can keep spoofing continuously by updating the target computer’s ARP table more frequently. -. If one or more network interface cards are installed on a computer, you can choose which NIC you would like SwitchSniffer to scan and spoof through. -. SwitchSniffer can display information about the amount of data transferred to and from the internet. -. SwitchSniffer can detect if any computer on the LAN is running an ‘arpspoofer’ program. -. SwitchSniffer can filter: sessions, local hosts, and remote hosts. -. The installation of the ‘winpcap’ driver is not necessary for SwitchSniffer. -. SwitchSniffer can manage the local hosts based on MAC Address. -. SwitchSniffer can act as a plug-and-played router. -. SwitchSniffer can export the data of view into an excel file. -. SwitchSniffer can cure arp-cache poisoning. SwitchSniffer has the following benefits: -. SwitchSniffer can make you use the network without blocking by arp-spoofer such as netcut, winarpspoofer and so on. -. SwitchSniffer can find the hidden hosts on the LAN, which is not found by IP-Scanners. -. SwitchSniffer can find if abnormal hosts are connected to your wireless network. -. SwitchSniffer protects your network from abnormal users. -. SwitchSniffer can check if there are abnormal packets on the LAN. -. SwitchSniffer allows you to capture user IDs, passwords, chat sessions and web sessions etc., on the switched network through the use of a sniffer application. -. SwitchSniffer can block the local hosts based on MAC Address. -. SwitchSniffer can resolve the problem of IP Collision. -. SwitchSniffer can find out the country name by ip address on remote. -. SwitchSniffer enables you to monitor all the packets on a switch network.

Astral
Added 2006-02-09
by Black List Software
Astral was designed to capture local network packet activity, translate the packets to readable form, and log the data. Astral can capture data using either Dialup, Ethernet, or a Wireless adapter. Astral runs on Windows NT, XP, and 2000, maybe more. Astral comes with an additional application, titled sort.exe. Sort can be used to parse one's astral log file using a set of built-in terms or any custom term which aid to integration and the exclusion of irrelevant data. Build your own custom integration scripts, make Astral look, feel, and work the way you want! Examples included!

BobCat
Added 2006-02-04
by nmonkee
BobCat is a tool to aid a security consultant in taking full advantage of SQL injection vulnerabilities. It is based on a tool named "Data Thief" that was published as PoC by appsecinc. BobCat can exploit SQL injection bugs/opportunities in web applications, independent of language, but dependent on MS SQL as the back end DB.

MSN Messenger Password Recovery
Added 2006-01-18
by Reactive Software
MSN Messenger Password Recovery is the MSN password finder that instantly cracks and decrypts the MSN Messenger and Windows Messenger passwords stored on your computer. It can be used to recover your forgotten MSN password. Program works when the “Remember my Password” tickbox is checked in the messenger. All versions of MSN Messenger and Windows Messenger are supported. Multiple accounts are also supported.

Windows Permission Identifier
Added 2006-01-18
by Nathan House
This tool enables administrators and penetration testers to review and audit the permissions of users on a windows machine. Windows Permission Identifier can check; File ACLs Folder ACLs Registry ACLs Services Permissions Shares Installation rights Internet Access and so on. The GUI enables the administrator to create policies that can be saved in XML format. The windows machines permissions are then checked against this policy. This enables administrators to run checks against existing organisational windows security baseline documents. Policies can be saved in XML format and all results can be exported for further use. WARNING: The policy that is included is a sample of the functionality of the tool. It is not a security policy that should be followed. Report Bugs & send your own policy files : nhouse[at]stationx.net It would be very useful to the community if you send me any policies you create. For example, Web server, desktop, domain controller or what ever you create. I will upload your policy files to the site and credit you.

Firewall Test Agent
Added 2006-01-18
by Nathan House
This simple tool can be used to test and log the rules on a firewall. The Firewall Test Agent is able to open up any number of TCP and UDP ports on a windows machine and log any connection attempts. A port scanner or other such tool can then be used to scan through the firewall to find which ports have been allowed through in the firewall rule base. This tool is useful when you don't have access to the firewall rules. This tool could also be used as a port scan monitor if you are interested in the number of scans your networks are receiving. WARNING: Some machines will NOT be able to open thousands of ports. With older, slower and heavily utilized machines you should only open a few thousand ports at a time. I do not recommend any more than 10,000 ports at any one time although 65,535 if theoretically possible.

Collapse Web Application Scanner
Added 2006-01-17
by Syhunt Security Team
Collapse, a free tool from Syhunt, allows web administrators to perform aggressive and comprehensive scans of an organization's web server to isolate vulnerabilities and identify security holes. The Collapse scanner requires basic inputs such as host names and port numbers to scan a complete web site and test all the web applications for security vulnerabilities. This new version supports multithreaded scanning of web servers

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus