(Page 6 of 84)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >

Category: Utilities

Token Thieffer
Added 2006-10-10
by Andres Tarasco
Searching for global objects, Tthieffer is able to extract all memory tokens (both local and remote tokens) and execute code with those tokens by impersonating users. If delegation is available, tthieffer can also impersonate network users.

UserLock
Added 2006-09-29
by IS Decisions
UserLock secures access to Windows networks by controlling the amount of simultaneous sessions and by limiting network access per user or group. With UserLock, a network administrator can implement and enforce efficient restriction and access policies for Windows NT/2000/XP/2003 networks (LAN and WAN), and monitor and manage all sessions in real time: receive alerts, remotely disconnect or lock a user session and automatically log activity and generate precise session reports and statistics.

SpoofMAC
Added 2006-09-14
by Socketsoft.net
SpoofMAC is a powerful, easy to use and intuitive MAC Address Changing (Spoofing) Tool for Windows systems. Includes Command-line Scripting, IPConfig and automatic spoofing tools. SpoofMAC allows users to change the MAC Address of Network Adapters on Windows 2000, XP and 2003 Server systems. SpoofMAC helps people protect their privacy by hiding their MAC Address and helps IT Professionals test network security and recover MAC Address based software licenses. SpoofMAC was developed by certified IT Security and Software Development professionals.

JAAScois PC Monitor v1.0
Added 2006-09-10
by JAAScois
» Protecting system and windows startup » Protecting internet explorer from hijacks & spyware » Preventing access to computer settings » Internet filtering for web sites , chat rooms and e-mail

MSN Password Recovery
Added 2006-09-07
by Reactive Software
MSN Messenger Password Recovery is the MSN password finder that instantly cracks and decrypts the MSN Messenger and Windows Messenger passwords stored on your computer. New version adds support for latest Windows Live Messeger (version 8).

MDCrack
Added 2006-09-07
by Gregory Duchemin
MDCrack is a free featureful password cracker designed to bruteforce several commonly used hash algorithms at a very aggressive speed rate. It can retrieve any password made of up to 8 characters (16 for PIX algorithms) and 55 characters when salted. In order to achieve the highest possible speed rate, this program uses several cores for each algorithm it supports. Each one of these cores provides a different level of optimization designed to best fit with a specific set of command line options. Whatever command line configuration is used, MDCrack will always arrange to use the best available core. To date, this program supports bruteforce attacks on MD2, MD4, MD5, NTLMv1 and PIX (enable and users) hashes, the list of algorithms is growing up. Multi threading allows for parallel cracking and load sharing between several CPUs and multiplies overall speed by the number of available processor(s). This yields to phenomenal performance even on old generation multi-CPUs systems. Several options offer fine tuning for the attack and allow to save and resume your session at a later time. This program has multiple uses in real life, while its primary goal is obviously to test the strength of hashed passwords, it can also be used as a raw benchmark tool for integer calculs. For any question you may have, please be sure to first read the Frequenty Ask Questions file (FAQ) provided in MDCrack ZIP file. I hope you will enjoy this program.

Email Detective - Forensic Software Tool
Added 2006-08-31
by Hot Pepper Technology, Inc.
Any AOL email that has been cached or saved on a users disk drive is extracted, complete with all embedded pictures. EMail Detective - Forensic Software Tool - for use with all versions of America Online, is used by many law enforcement agencies in the U.S. and has become an invaluable tool in numerous investigations and data recovery by forensic examiners. Any AOL email that has been cached or saved on a users disk drive is extracted, complete with all embedded pictures. A comprehensive report is produced for the examiner detailing the results.

SwitchSnarf
Added 2006-08-26
by Ekrem ORAL
SwithSnarf enables monitoring the internet connection of any computer in a network established with a switch. SwitchSnarf scans all working computers in the local network and identifies their MAC addresses, IP addresses and Computer Names (Hostnames). The internet in/out going internet connections of a computer can be monitored in cooperation with any network monitoring programme (sniffer) or the Nexeye Monitoring Enterprise. No changes are required in the network setup and no additional software is needed on the computer that is monitored. Technical Structure: In a local network established with a switch, the packages are sent to the relevant computer only. SwitchSnarf utilises ARP packages that are used for identifying the computer details. By capturing the ARP packages that are sent to the gateway, SwitchSnarf monitors the network traffic.

Security Quiz Screensavers
Added 2006-08-22
by Michael Hendrickx
This adaptable screensaver written in C# shows a basic security quiz on the screen. This can be used for awareness or just plain fun. .NET framework required.

Spamtitan ISO
Added 2006-08-17
by Ronan Kavanagh
SpamTitan ISO provides the comprehensive solution to email threats on the market today. Our software allows you to create an email appliance, protecting from Viruses, Spam and Phishing. The solution uses best of breed technologies to provide an easily installed, easily managed and highly secure solution for your email. Dual Anti Virus including Kaspersky Labs 98%+ Spam Detection Content Filtering In and outward bound email scanning Disclaimers Load Balancing Options End User Spam Management Plug and Play Set up Web GUI Fully automated Updating Full reporting suite LDAP Integration 30 Day Free Trial Available. Contact info@spamtitan.com for an evaluation licence

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus