(Page 9 of 47)   < Prev  4 5 6 7 8 9 10 11 12 13 14  Next >

Platform: Windows XP

SpoofMAC
Added 2006-09-14
by Socketsoft.net
SpoofMAC is a powerful, easy to use and intuitive MAC Address Changing (Spoofing) Tool for Windows systems. Includes Command-line Scripting, IPConfig and automatic spoofing tools. SpoofMAC allows users to change the MAC Address of Network Adapters on Windows 2000, XP and 2003 Server systems. SpoofMAC helps people protect their privacy by hiding their MAC Address and helps IT Professionals test network security and recover MAC Address based software licenses. SpoofMAC was developed by certified IT Security and Software Development professionals.

N-Stalker Web Application Security Scanner 2006
Added 2006-09-13
by N-Stalker
N-Stalker Free Edition allows for quick security assessment of Web Applications under the perspective of Infrastructure and Deployment phases. It scans for more than 18,000 vulnerabilities, crawl your web application, discover hidden directories/files and look for backup files.

JAAScois PC Monitor v1.0
Added 2006-09-10
by JAAScois
» Protecting system and windows startup » Protecting internet explorer from hijacks & spyware » Preventing access to computer settings » Internet filtering for web sites , chat rooms and e-mail

MSN Password Recovery
Added 2006-09-07
by Reactive Software
MSN Messenger Password Recovery is the MSN password finder that instantly cracks and decrypts the MSN Messenger and Windows Messenger passwords stored on your computer. New version adds support for latest Windows Live Messeger (version 8).

Softros LAN Messenger
Added 2006-09-07
by Softros Systems, Inc.
Softros LAN Messenger is an easy-to-use, serverless LAN messaging application for effective intra-office communication. Features include: - Message notification alarms - Personal or group messaging - File transfers - Encryption options - Message logs - Microsoft/Citrix Terminal Services support

Colasoft Capsa professional
Added 2006-09-07
by Colasoft Co., Ltd
Expert packets sniffer designed for packet decoding and network diagnosis, Colasoft Capsa monitors the network traffic transmitted over a local host and a local network

Colasoft Capsa Enterprise
Added 2006-09-07
by Colasoft Co., Ltd
Expert packets sniffer designed for packet decoding and network diagnosis, Colasoft Capsa monitors the network traffic transmitted over a local host and a local network

MDCrack
Added 2006-09-07
by Gregory Duchemin
MDCrack is a free featureful password cracker designed to bruteforce several commonly used hash algorithms at a very aggressive speed rate. It can retrieve any password made of up to 8 characters (16 for PIX algorithms) and 55 characters when salted. In order to achieve the highest possible speed rate, this program uses several cores for each algorithm it supports. Each one of these cores provides a different level of optimization designed to best fit with a specific set of command line options. Whatever command line configuration is used, MDCrack will always arrange to use the best available core. To date, this program supports bruteforce attacks on MD2, MD4, MD5, NTLMv1 and PIX (enable and users) hashes, the list of algorithms is growing up. Multi threading allows for parallel cracking and load sharing between several CPUs and multiplies overall speed by the number of available processor(s). This yields to phenomenal performance even on old generation multi-CPUs systems. Several options offer fine tuning for the attack and allow to save and resume your session at a later time. This program has multiple uses in real life, while its primary goal is obviously to test the strength of hashed passwords, it can also be used as a raw benchmark tool for integer calculs. For any question you may have, please be sure to first read the Frequenty Ask Questions file (FAQ) provided in MDCrack ZIP file. I hope you will enjoy this program.

Rootkit's Unloader Improvements by Andrea Palmate
Added 2006-09-05
by Nima Bagheri
Improvements by Andrea Palmate It's tool for unmapping the modules and loaded Rootkit's DLLS. It also can terminate the Threads and processes. For Unloading the Rootkits first you must know your target's DLL After finding these Processes you can terminate the Library. Tip: Before selecting this you must close and save your Program's Data, because this Program erasing all Threads and Maybe Your Lose your data .TerminateThread is a dangerous function that should only be used in the most extreme cases. You should call TerminateThread only if you know exactly what the target thread is doing, and you control all of the code that the target thread could possibly be running at the time of the termination. Down load's Link Full Source Code with Binary https://www.rootkit.com/vault/neocrackr/Rootkits_Unloader.rar E-Mail Thecrackers_group<>AT<>Yahoo<>DOT<>CA

Collapse Web Application Scanner
Added 2006-09-05
by Syhunt Security Team
Collapse, a free tool from Syhunt, allows web administrators to perform aggressive and comprehensive scans of an organization's web server to isolate vulnerabilities and identify security holes. The Collapse scanner requires basic inputs such as host names and port numbers to scan a complete web site and test all the web applications for security vulnerabilities. This new version includes an improved GUI, new web application security checks and many other additional enhancements.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus