(Page 5 of 125)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >

Category: Auditing

XSS Scanner
Added 2007-06-25
by d3hydr8
XSS Scanner that can find hosts using a google query or search one site. If XSS is found it attempts to collect email addresses to further your attack or warn the target of the flaw. When the scan is complete it will print out the XSS's found and or write to file, it will find false positives so manually check before getting to excited. It also has verbose mode and you can change the alert pop-up message, check options!!

Windows Live Password Recovery
Added 2007-05-05
by Reactive Software
Windows Live Password Recovery is the tool that will instantly find, decrypt & recover Windows Live passwords that were saved by Windows Live Messenger on your PC under the current login. This decoder will recover multiple accounts and supports all known versions of Windows Live Messenger including Messenger Beta, MSN Messenger and Windows Messenger. This cracker works when the "Remember My Password" checkbox is ticked in Windows Live Messenger. Even is you have un-installed Windows Live Messenger there is still a chance that your password is saved on your PC.

SpyStudio
Added 2007-05-02
by Hernan Gonzalez, Rodrigo Perez Varas
SpyStudio is an application to monitor API calls made by different processes. It simplifies the code execution interception operations to really know what is happening in the Windows Operating System's processes and in its applications.

ZippyLock
Added 2007-03-29
by Ergun Çoruh
ZippyLock is a free and extremely easy to use password management utility. Your password entries are kept in a 'private file' and nowhere else. ZippyLock uses Windows clipboard to transfer your data into forms (see the Demo at web site). When you run ZippyLock for the first time, it prompts you to create a new private file, and asks you to specify a MASTER PASSWORD. Later you will be prompted to save your private file. The private file will be stored on your hard-disk (or a USB Disk). The private file will be Triple-DES encrypted using a unique hash number generated from your MASTER PASSWORD. The hash number too will be encrypted by itself and stored in the same private file along with your encrypted passwords. Note that your MASTER PASSWORD is not stored anywhere. Your encrypted passwords are not stored anywhere other than the private file. No other auxiliary or reference information is kept in hidden places like registry, WINDOWS directory etc. Everything is stored in your private file that you control and nowhere else. In general TDES with three different keys (3TDES) has a key length of 168 bits: three 56-bit DES keys (with parity bits 3TDES has the total storage length of 192 bits), but due to the meet-in-the-middle attack the effective security it provides is only 112 bits. As of 2005, the best attack known on 3TDES requires around 232 known plaintexts, 2113 steps, 290 single DES encryptions, and 288 memory. This is not currently practical.

Scuba by Imperva
Added 2007-03-05
by Imperva
Scuba by Imperva is a free, lightweight Java utility that scans Oracle, DB2, MS-SQL, and Sybase databases for known vulnerabilities and configuration flaws. Based on its assessment results, Scuba creates clear, informative reports with detailed test descriptions. Summary reports, available in Java and HTML format, illustrate overall risk level. With Scuba by Imperva, you are quickly on your way to meeting industry-leading best practices for database configuration and management.

SSA Security System Analyzer
Added 2007-02-21
by SSA Team
A local vulnerabilty analyzer based on OVAL concept. http://www.security-database.com/ssa.php 1.5 Final Release * NOW SSA Security System Analyzer in added to OVAL.mitre.org compatibility program o http://oval.mitre.org/compatible/questionnaires/21.html * NOW fully based on OVAL 5.2 Interpreter. * Added OVAL XML Database Plug-in. o View OVAL ID Information o Search by OS and OVAL ID + Double click on entry and get more information (linked to OVAL.mitre.org and security-database.com) o More information about CVE (CVSS, Related sources, Related missed patches....) * Added function Stop/Reload in SSA * Improved performance in SSA Core Scanner * Fixed bugs (function checks, abnormal scan abort...) * Fixed bugs in Updater Plug-in * Added second progress bar in Updater Plug-in to indicate the stages left to be processed.

Source Security
Added 2007-01-15
by
sourcesec.com provides Web-based access to code auditing applications, and was created to assist developers and users in auditing their programs for vulnerabilities. You can upload your code for static analysis by RATS, Flawfinder and ITS4 as applicable - the C/C++, PHP Python and Perl languages are supported. Additionally, a simplified search function is available which easily allows efficient Web searches for security-related information.

Scuba by Imperva
Added 2007-01-05
by Imperva
Scuba by Imperva is a free, lightweight Java tool that scans Oracle, DB2, MS-SQL, and Sybase databases for hundreds of software vulnerabilities. It also detects configuration flaws like insecure passwords, unsafe processes, unrestricted permission levels, and more. Furthermore, it generates HTML and Java reports that show overall security risk level and detailed information about each vulnerability – so you can pinpoint configuration risks within minutes. Scuba by Imperva detects hundreds of database vulnerabilities and configuration issues. And better yet – it helps you meet industry-leading best practices standards for database configuration and management.

Technitium MAC Address Changer v4
Added 2006-12-19
by Shreyas Zare
Technitium MAC Address Changer allows you to change Machine Access Control (MAC) Address of your Network Interface Card (NIC) irrespective to your NIC manufacturer or its driver. It has a very simple user interface and provides ample of information regarding each NIC in the machine. Every NIC has an MAC address hard coded in its circuit by its manufacturer. This hard coded MAC address is used by windows drivers to access Ethernet Networks (LAN). This tool can set a new MAC address to your NIC, bypassing the original hard coded MAC address. Technitium MAC Address Changer is a must tool in every security professionals tool box. Technitium MAC Address Changer v4.0 is coded in Visual Basic 6.0.

TXDNS
Added 2006-12-12
by Arley Silveira
TXDNS is a Win32 aggressive multithreaded DNS digger/bruteforcer. Capable of placing, on the wire, thousands of DNS queries per minute. TXDNS main goal is to expose a domain namespace trough a number of techniques.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus