(Page 1 of 89)   1 2 3 4 5 6 7 8 9 10 11  Next >

Platform: Windows NT

Harden SSL/TLS
Added 2010-02-22
by Thierry Zoller
Harden SSL/TLS” allows hardening SSL/TLS Schannel settings of Windows 2000,2003,2008,2008R2, XP,Vista,7. It allows to locally and remotely set SSL policies allowing or denying certain ciphers/hashes or complete ciphersuites. This tool specific allows setting policies with regards to what ciphers and protocols are available to applications that use SCHANNEL crypto interface. A lot of windows applications do use this interface, for instance Google Chrome as well as Apple Safari are a few of these. By changing the settings you can indirectly control what ciphers these applications are allowed to use.

Data recovery utility
Added 2009-08-07
by Data recovery
Company provides data recovery utility to recover and restore inaccessible memory card data, sim card content and iPod music files.

moth
Added 2009-06-08
by Bonsai - Information Security
Moth is a VMware image with a set of vulnerable Web Applications and scripts, that you may use for: 1. Testing Web Application Security Scanners 2. Testing Static Code Analysis tools (SCA) 3. Giving an introductory course to Web Application Security

NetworkMiner
Added 2009-05-21
by
NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows that can detect the OS, hostname and open ports of network hosts through packet sniffing or by parsing a PCAP file. NetworkMiner can also extract transmitted files from network traffic.

WinFail2Ban
Added 2009-01-11
by Vittorio Pavesi
Scans log files like FTP Logs or Event Viewer and bans IP that makes too many password failures. Basic idea is porting the features of Fail2Ban (http://www.fail2ban.org/) from Linux to Windows.

D.O.P.E
Added 2008-12-26
by Mr.Mojo
Dis.Org Penetration Extension for Firefox (D.O.P.E) A User agent Switcher for firefox that supports the following: Search engine Impersonating Operating Systems Impersonation Browser Impersonation Cellular Phones and Mobile Devices Impersonation Game Consoles Impersonation http://www.lostlight.net/tools/blog.html

LogonExpert
Added 2008-11-20
by Softros Systems, Inc.
Allows system administrators to adjust secure Windows autologon for each workstation or\and server in company domain. LogonExpert directly interacts with Winlogon provider (credentials providers Vista/Server 2008) and keeps logon credentials are encrypted by AES 256-bit.

OSSEC HIDS
Added 2008-11-18
by Third Brigade
OSSEC is an Open Source Host-based Intrusion Detection System. It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, real-time alerting and active response. It runs on most operating systems, including Linux, OpenBSD, FreeBSD, MacOS, Solaris and Windows.

SecurePE
Added 2008-10-23
by Luis
SecurePE is a user friendly freeware utility coded in 32bit assembly language that protects Microsoft Windows® PE files with a password, strong RC4 encryption and checksum while leaving them totally functional.

Injector
Added 2008-10-12
by Raviv Raz
Injector is an automatic SQL injection tool able to evade signature detection by encoding its payload commands in binary format using the SQL CAST command. It can create automatic web site defacement or OS command execution on the backend database server. Good for testing web site immunity against ASPROX bot-net mass sql injections.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus