Are you over 18 and want to see adult content?
More Annotations
![A complete backup of placement-international.org](https://www.archivebay.com/archive/91bb19ba-66d2-4c15-9dc0-503bb61a9eb6.png)
A complete backup of placement-international.org
Are you over 18 and want to see adult content?
![A complete backup of netoffersonline.info](https://www.archivebay.com/archive/2f673e2b-aec7-47e6-a921-9f3bf6ea9c67.png)
A complete backup of netoffersonline.info
Are you over 18 and want to see adult content?
![A complete backup of flowerchilddancinginaminefeild.tumblr.com](https://www.archivebay.com/archive/7e9e9180-5458-4fb2-b3f3-8d79b0270de0.png)
A complete backup of flowerchilddancinginaminefeild.tumblr.com
Are you over 18 and want to see adult content?
![A complete backup of yourdailydance.com](https://www.archivebay.com/archive/b847a8ea-e016-4373-968f-6524eeac6b82.png)
A complete backup of yourdailydance.com
Are you over 18 and want to see adult content?
![A complete backup of emeraldbayalumni.org](https://www.archivebay.com/archive/d1985f2e-4442-4d89-8115-0ebf390c5f51.png)
A complete backup of emeraldbayalumni.org
Are you over 18 and want to see adult content?
![A complete backup of world-nuclear.org](https://www.archivebay.com/archive/d7964643-496c-4489-bafd-afdb22d7d1ed.png)
A complete backup of world-nuclear.org
Are you over 18 and want to see adult content?
![A complete backup of celula-uhscp.blogspot.com](https://www.archivebay.com/archive/8656f78c-cb21-480a-97ac-f8d93095338f.png)
A complete backup of celula-uhscp.blogspot.com
Are you over 18 and want to see adult content?
![A complete backup of feelgoodcontacts.com](https://www.archivebay.com/archive/6162f7e3-d941-4615-bf9b-ab9de9d7cfab.png)
A complete backup of feelgoodcontacts.com
Are you over 18 and want to see adult content?
Favourite Annotations
![A complete backup of perishablenews.com](https://www.archivebay.com/archive2/d17c8791-81cf-4526-9e07-ffb5e84d7cbc.png)
A complete backup of perishablenews.com
Are you over 18 and want to see adult content?
![A complete backup of meridiancollege.co.uk](https://www.archivebay.com/archive2/3eba27df-3623-4d62-9278-472022288441.png)
A complete backup of meridiancollege.co.uk
Are you over 18 and want to see adult content?
![A complete backup of arkhamcity.co.uk](https://www.archivebay.com/archive2/38e287e4-43ac-4669-8a60-2de0a049f118.png)
A complete backup of arkhamcity.co.uk
Are you over 18 and want to see adult content?
![A complete backup of schweizerfleisch.ch](https://www.archivebay.com/archive2/27f61aff-b356-4020-92dd-ff5022e7f509.png)
A complete backup of schweizerfleisch.ch
Are you over 18 and want to see adult content?
![A complete backup of americansworking.com](https://www.archivebay.com/archive2/13fdad13-88a4-4bef-ad27-bd55c7914fc4.png)
A complete backup of americansworking.com
Are you over 18 and want to see adult content?
Text
asset management.
PAROS PROXY
Paros proxy. A Java-based web proxy for assessing web application vulnerability. It supports editing/viewing HTTP/HTTPS messages on-the-fly to change items such as cookies and form fields. It includes a web traffic recorder, web spider, hash calculator, and a scanner for testing common web application attacks such as SQLinjection and cross
BRUTUS – SECTOOLS TOP NETWORK SECURITY TOOLS Brutus. This Windows-only cracker bangs against network services of remote systems trying to guess passwords by using a dictionary and permutations thereof. It supports HTTP, POP3, FTP, SMB, TELNET, IMAP, NNTP, and more. No source code is THC HYDRA – SECTOOLS TOP NETWORK SECURITY TOOLS THC Hydra. When you need to brute force crack a remote authentication service, Hydra is often the tool of choice. It can perform rapid dictionary attacks against more than 50 protocols, including telnet, ftp, http, https, smb, several databases, and much more. Like THC Amap this release is from the fine folks at THC.CAIN AND ABEL
sniffers. UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing thenetwork
L0PHTCRACK – SECTOOLS TOP NETWORK SECURITY TOOLS L0phtCrack. pass-audit. L0phtCrack attempts to crack Windows passwords from hashes which it can obtain (given proper access) from stand-alone Windows workstations, networked servers, primary domain controllers, or Active Directory. In some cases it can sniff the hashes off the wire. It also has numerous methods of generating password guesses SUPERSCAN – SECTOOLS TOP NETWORK SECURITY TOOLS Superscan. port-scanners. Superscan is a free Windows-only closed-source TCP/UDP port scanner by Foundstone (now part of McAfee). It includes a variety of additional networking tools such as ping, traceroute, HTTP HEAD, and whois. Some functionality has been crippled by restrictions imposed by Microsoft in Windows XP SP2 and newerreleases.
NEXPOSE – SECTOOLS TOP NETWORK SECURITY TOOLS Rapid7 Nexpose is a vulnerability scanner which aims to support the entire vulnerability management lifecycle, including discovery, detection, verification, risk classification, impact analysis, reporting and mitigation. It integrates with Rapid7's Metasploit for vulnerability exploitation. NBTSCAN – SECTOOLS TOP NETWORK SECURITY TOOLS NBTScan is a program for scanning IP networks for NetBIOS name information (similar to what the Windows nbtstat tool provides against single hosts). It sends a NetBIOS status query to each address in a supplied range and lists received information in human readable form. For each responded host it lists IP address, NetBIOS computer name,logged
SECTOOLS.ORG TOP NETWORK SECURITY TOOLSSECURITY TOOLSSNIFFERSVULN SCANNERSWEB SCANNERSWIRELESSEXPLOITATION SecTools.Org: Top 125 Network Security Tools. For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form.This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the SAINT SECURITY SUITE SAINT Security Suite. vuln-scanners. SAINT is a commercial vulnerability assessment and penetration system. It was originally developed in the late 1990's as free UNIX tool based on the open source SATAN scanner. Later it went commercial and broadened into a whole suite of tools for vulnerability detection, exploitation, andasset management.
PAROS PROXY
Paros proxy. A Java-based web proxy for assessing web application vulnerability. It supports editing/viewing HTTP/HTTPS messages on-the-fly to change items such as cookies and form fields. It includes a web traffic recorder, web spider, hash calculator, and a scanner for testing common web application attacks such as SQLinjection and cross
BRUTUS – SECTOOLS TOP NETWORK SECURITY TOOLS Brutus. This Windows-only cracker bangs against network services of remote systems trying to guess passwords by using a dictionary and permutations thereof. It supports HTTP, POP3, FTP, SMB, TELNET, IMAP, NNTP, and more. No source code is THC HYDRA – SECTOOLS TOP NETWORK SECURITY TOOLS THC Hydra. When you need to brute force crack a remote authentication service, Hydra is often the tool of choice. It can perform rapid dictionary attacks against more than 50 protocols, including telnet, ftp, http, https, smb, several databases, and much more. Like THC Amap this release is from the fine folks at THC.CAIN AND ABEL
sniffers. UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing thenetwork
L0PHTCRACK – SECTOOLS TOP NETWORK SECURITY TOOLS L0phtCrack. pass-audit. L0phtCrack attempts to crack Windows passwords from hashes which it can obtain (given proper access) from stand-alone Windows workstations, networked servers, primary domain controllers, or Active Directory. In some cases it can sniff the hashes off the wire. It also has numerous methods of generating password guesses SUPERSCAN – SECTOOLS TOP NETWORK SECURITY TOOLS Superscan. port-scanners. Superscan is a free Windows-only closed-source TCP/UDP port scanner by Foundstone (now part of McAfee). It includes a variety of additional networking tools such as ping, traceroute, HTTP HEAD, and whois. Some functionality has been crippled by restrictions imposed by Microsoft in Windows XP SP2 and newerreleases.
NEXPOSE – SECTOOLS TOP NETWORK SECURITY TOOLS Rapid7 Nexpose is a vulnerability scanner which aims to support the entire vulnerability management lifecycle, including discovery, detection, verification, risk classification, impact analysis, reporting and mitigation. It integrates with Rapid7's Metasploit for vulnerability exploitation. NBTSCAN – SECTOOLS TOP NETWORK SECURITY TOOLS NBTScan is a program for scanning IP networks for NetBIOS name information (similar to what the Windows nbtstat tool provides against single hosts). It sends a NetBIOS status query to each address in a supplied range and lists received information in human readable form. For each responded host it lists IP address, NetBIOS computer name,logged
SECTOOLS.ORG TOP NETWORK SECURITY TOOLS SecTools.Org: Top 125 Network Security Tools. For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form.This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the AIRCRACK – SECTOOLS TOP NETWORK SECURITY TOOLS Aircrack. pass-audit. wireless. Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. It implements the best known cracking algorithms to recover wireless keys once enough encrypted packets have been gathered. . The suite comprises over a dozen discrete tools, including airodump (an 802.11 packet capture program),aireplay (an 802
SECUNIA PSI
Secunia PSI (Personal Software Inspector) is a free security tool designed to detect vulnerable and out-dated programs and plug-ins that expose your PC to attacks. Attacks exploiting vulnerable programs and plug-ins are rarely blocked by traditional anti-virus programs. Secunia PSI checks only the machine it is running on, while itscommercial
NEXPOSE – SECTOOLS TOP NETWORK SECURITY TOOLS Rapid7 Nexpose is a vulnerability scanner which aims to support the entire vulnerability management lifecycle, including discovery, detection, verification, risk classification, impact analysis, reporting and mitigation. It integrates with Rapid7's Metasploit for vulnerability exploitation. SUPERSCAN – SECTOOLS TOP NETWORK SECURITY TOOLS Superscan. port-scanners. Superscan is a free Windows-only closed-source TCP/UDP port scanner by Foundstone (now part of McAfee). It includes a variety of additional networking tools such as ping, traceroute, HTTP HEAD, and whois. Some functionality has been crippled by restrictions imposed by Microsoft in Windows XP SP2 and newerreleases.
ENCRYPTION TOOLS
SecTools.Org: Top 125 Network Security Tools. For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form.This site allows open source and commercial tools on any platform, except those tools that we maintain (such as theGRENDEL-SCAN
Grendel-Scan. Grendel-Scan is an open-source web application security testing tool. It has automated testing module for detecting common web application vulnerabilities, and features geared at aiding manual penetration tests. For downloads and more information, visit the Grendel-Scan homepage . WIRESHARK – SECTOOLS TOP NETWORK SECURITY TOOLS Wireshark. Wireshark (known as Ethereal until a trademark dispute in Summer 2006) is a fantastic open source multi-platform network protocol analyzer. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail youneed.
VULNERABILITY SCANNERS SecTools.Org: Top 125 Network Security Tools. For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form.This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the WEB VULNERABILITY SCANNERS web-scanners. (6) ★★★★★ Netsparker (#75, new! ) Netsparker is a web application security scanner, with support for both detection and exploitation of vulnerabilities. It aims to be false positive–free by only reporting confirmed vulnerabilities after successfully exploiting or otherwise testing them. Read 7 SECTOOLS.ORG TOP NETWORK SECURITY TOOLSSECURITY TOOLSSNIFFERSVULN SCANNERSWEB SCANNERSWIRELESSEXPLOITATION SecTools.Org: Top 125 Network Security Tools. For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form.This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the SAINT SECURITY SUITE SAINT Security Suite. vuln-scanners. SAINT is a commercial vulnerability assessment and penetration system. It was originally developed in the late 1990's as free UNIX tool based on the open source SATAN scanner. Later it went commercial and broadened into a whole suite of tools for vulnerability detection, exploitation, andasset management.
SECUNIA PSI
Secunia PSI (Personal Software Inspector) is a free security tool designed to detect vulnerable and out-dated programs and plug-ins that expose your PC to attacks. Attacks exploiting vulnerable programs and plug-ins are rarely blocked by traditional anti-virus programs. Secunia PSI checks only the machine it is running on, while itscommercial
PAROS PROXY
Paros proxy. A Java-based web proxy for assessing web application vulnerability. It supports editing/viewing HTTP/HTTPS messages on-the-fly to change items such as cookies and form fields. It includes a web traffic recorder, web spider, hash calculator, and a scanner for testing common web application attacks such as SQLinjection and cross
DUMPSEC – SECTOOLS TOP NETWORK SECURITY TOOLS DumpSec. DumpSec is a security auditing program for Microsoft Windows NT/XP/200x. It dumps the permissions (DACLs) and audit settings (SACLs) for the file system, registry, printers and shares in a concise, readable format, so that holes in system security are readily apparent. DumpSec also dumps user, group and replication information. BRUTUS – SECTOOLS TOP NETWORK SECURITY TOOLS Brutus. This Windows-only cracker bangs against network services of remote systems trying to guess passwords by using a dictionary and permutations thereof. It supports HTTP, POP3, FTP, SMB, TELNET, IMAP, NNTP, and more. No source code is THC HYDRA – SECTOOLS TOP NETWORK SECURITY TOOLS THC Hydra. When you need to brute force crack a remote authentication service, Hydra is often the tool of choice. It can perform rapid dictionary attacks against more than 50 protocols, including telnet, ftp, http, https, smb, several databases, and much more. Like THC Amap this release is from the fine folks at THC. NBTSCAN – SECTOOLS TOP NETWORK SECURITY TOOLS NBTScan is a program for scanning IP networks for NetBIOS name information (similar to what the Windows nbtstat tool provides against single hosts). It sends a NetBIOS status query to each address in a supplied range and lists received information in human readable form. For each responded host it lists IP address, NetBIOS computer name,logged
L0PHTCRACK – SECTOOLS TOP NETWORK SECURITY TOOLS L0phtCrack. pass-audit. L0phtCrack attempts to crack Windows passwords from hashes which it can obtain (given proper access) from stand-alone Windows workstations, networked servers, primary domain controllers, or Active Directory. In some cases it can sniff the hashes off the wire. It also has numerous methods of generating password guessesGRENDEL-SCAN
Grendel-Scan. Grendel-Scan is an open-source web application security testing tool. It has automated testing module for detecting common web application vulnerabilities, and features geared at aiding manual penetration tests. For downloads and more information, visit the Grendel-Scan homepage . SECTOOLS.ORG TOP NETWORK SECURITY TOOLSSECURITY TOOLSSNIFFERSVULN SCANNERSWEB SCANNERSWIRELESSEXPLOITATION SecTools.Org: Top 125 Network Security Tools. For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form.This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the SAINT SECURITY SUITE SAINT Security Suite. vuln-scanners. SAINT is a commercial vulnerability assessment and penetration system. It was originally developed in the late 1990's as free UNIX tool based on the open source SATAN scanner. Later it went commercial and broadened into a whole suite of tools for vulnerability detection, exploitation, andasset management.
SECUNIA PSI
Secunia PSI (Personal Software Inspector) is a free security tool designed to detect vulnerable and out-dated programs and plug-ins that expose your PC to attacks. Attacks exploiting vulnerable programs and plug-ins are rarely blocked by traditional anti-virus programs. Secunia PSI checks only the machine it is running on, while itscommercial
PAROS PROXY
Paros proxy. A Java-based web proxy for assessing web application vulnerability. It supports editing/viewing HTTP/HTTPS messages on-the-fly to change items such as cookies and form fields. It includes a web traffic recorder, web spider, hash calculator, and a scanner for testing common web application attacks such as SQLinjection and cross
DUMPSEC – SECTOOLS TOP NETWORK SECURITY TOOLS DumpSec. DumpSec is a security auditing program for Microsoft Windows NT/XP/200x. It dumps the permissions (DACLs) and audit settings (SACLs) for the file system, registry, printers and shares in a concise, readable format, so that holes in system security are readily apparent. DumpSec also dumps user, group and replication information. BRUTUS – SECTOOLS TOP NETWORK SECURITY TOOLS Brutus. This Windows-only cracker bangs against network services of remote systems trying to guess passwords by using a dictionary and permutations thereof. It supports HTTP, POP3, FTP, SMB, TELNET, IMAP, NNTP, and more. No source code is THC HYDRA – SECTOOLS TOP NETWORK SECURITY TOOLS THC Hydra. When you need to brute force crack a remote authentication service, Hydra is often the tool of choice. It can perform rapid dictionary attacks against more than 50 protocols, including telnet, ftp, http, https, smb, several databases, and much more. Like THC Amap this release is from the fine folks at THC. NBTSCAN – SECTOOLS TOP NETWORK SECURITY TOOLS NBTScan is a program for scanning IP networks for NetBIOS name information (similar to what the Windows nbtstat tool provides against single hosts). It sends a NetBIOS status query to each address in a supplied range and lists received information in human readable form. For each responded host it lists IP address, NetBIOS computer name,logged
L0PHTCRACK – SECTOOLS TOP NETWORK SECURITY TOOLS L0phtCrack. pass-audit. L0phtCrack attempts to crack Windows passwords from hashes which it can obtain (given proper access) from stand-alone Windows workstations, networked servers, primary domain controllers, or Active Directory. In some cases it can sniff the hashes off the wire. It also has numerous methods of generating password guessesGRENDEL-SCAN
Grendel-Scan. Grendel-Scan is an open-source web application security testing tool. It has automated testing module for detecting common web application vulnerabilities, and features geared at aiding manual penetration tests. For downloads and more information, visit the Grendel-Scan homepage . SECTOOLS.ORG TOP NETWORK SECURITY TOOLS SecTools.Org: Top 125 Network Security Tools. For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form.This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the THC HYDRA – SECTOOLS TOP NETWORK SECURITY TOOLS THC Hydra. When you need to brute force crack a remote authentication service, Hydra is often the tool of choice. It can perform rapid dictionary attacks against more than 50 protocols, including telnet, ftp, http, https, smb, several databases, and much more. Like THC Amap this release is from the fine folks at THC.CAIN AND ABEL
sniffers. UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing thenetwork
ENCRYPTION TOOLS
SecTools.Org: Top 125 Network Security Tools. For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form.This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the SUPERSCAN – SECTOOLS TOP NETWORK SECURITY TOOLS Superscan. port-scanners. Superscan is a free Windows-only closed-source TCP/UDP port scanner by Foundstone (now part of McAfee). It includes a variety of additional networking tools such as ping, traceroute, HTTP HEAD, and whois. Some functionality has been crippled by restrictions imposed by Microsoft in Windows XP SP2 and newerreleases.
AIRCRACK – SECTOOLS TOP NETWORK SECURITY TOOLS Aircrack. pass-audit. wireless. Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. It implements the best known cracking algorithms to recover wireless keys once enough encrypted packets have been gathered. . The suite comprises over a dozen discrete tools, including airodump (an 802.11 packet capture program),aireplay (an 802
L0PHTCRACK – SECTOOLS TOP NETWORK SECURITY TOOLS L0phtCrack. pass-audit. L0phtCrack attempts to crack Windows passwords from hashes which it can obtain (given proper access) from stand-alone Windows workstations, networked servers, primary domain controllers, or Active Directory. In some cases it can sniff the hashes off the wire. It also has numerous methods of generating password guesses DIRBUSTER – SECTOOLS TOP NETWORK SECURITY TOOLS DirBuster searches for hidden pages and directories on a web server. Sometimes developers will leave a page accessible, but unlinked; DirBuster is meant to find these potential vulnerabilities. This is a Java application developed by OWASP . For downloads and more information, visit the DirBuster homepage . Popularity. #112, new! WIRESHARK – SECTOOLS TOP NETWORK SECURITY TOOLS Wireshark. Wireshark (known as Ethereal until a trademark dispute in Summer 2006) is a fantastic open source multi-platform network protocol analyzer. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail youneed.
RETINA – SECTOOLS TOP NETWORK SECURITY TOOLS Retina. vuln-scanners. Like Nessus, Retina's function is to scan all the hosts on a network and report on any vulnerabilities found. It was written by eEye, who are well known for their security research . For downloads and more information, visit the Retina homepage .Popularity.
SECTOOLS.ORG TOP NETWORK SECURITY TOOLSSECURITY TOOLSSNIFFERSVULN SCANNERSWEB SCANNERSWIRELESSEXPLOITATION SecTools.Org: Top 125 Network Security Tools. For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form.This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the SAINT SECURITY SUITE SAINT Security Suite. vuln-scanners. SAINT is a commercial vulnerability assessment and penetration system. It was originally developed in the late 1990's as free UNIX tool based on the open source SATAN scanner. Later it went commercial and broadened into a whole suite of tools for vulnerability detection, exploitation, andasset management.
SECUNIA PSI
Secunia PSI (Personal Software Inspector) is a free security tool designed to detect vulnerable and out-dated programs and plug-ins that expose your PC to attacks. Attacks exploiting vulnerable programs and plug-ins are rarely blocked by traditional anti-virus programs. Secunia PSI checks only the machine it is running on, while itscommercial
PAROS PROXY
Paros proxy. A Java-based web proxy for assessing web application vulnerability. It supports editing/viewing HTTP/HTTPS messages on-the-fly to change items such as cookies and form fields. It includes a web traffic recorder, web spider, hash calculator, and a scanner for testing common web application attacks such as SQLinjection and cross
L0PHTCRACK – SECTOOLS TOP NETWORK SECURITY TOOLS L0phtCrack. pass-audit. L0phtCrack attempts to crack Windows passwords from hashes which it can obtain (given proper access) from stand-alone Windows workstations, networked servers, primary domain controllers, or Active Directory. In some cases it can sniff the hashes off the wire. It also has numerous methods of generating password guesses DUMPSEC – SECTOOLS TOP NETWORK SECURITY TOOLS DumpSec. DumpSec is a security auditing program for Microsoft Windows NT/XP/200x. It dumps the permissions (DACLs) and audit settings (SACLs) for the file system, registry, printers and shares in a concise, readable format, so that holes in system security are readily apparent. DumpSec also dumps user, group and replication information. THC HYDRA – SECTOOLS TOP NETWORK SECURITY TOOLS THC Hydra. When you need to brute force crack a remote authentication service, Hydra is often the tool of choice. It can perform rapid dictionary attacks against more than 50 protocols, including telnet, ftp, http, https, smb, several databases, and much more. Like THC Amap this release is from the fine folks at THC. NBTSCAN – SECTOOLS TOP NETWORK SECURITY TOOLS NBTScan is a program for scanning IP networks for NetBIOS name information (similar to what the Windows nbtstat tool provides against single hosts). It sends a NetBIOS status query to each address in a supplied range and lists received information in human readable form. For each responded host it lists IP address, NetBIOS computer name,logged
GRENDEL-SCAN
Grendel-Scan. Grendel-Scan is an open-source web application security testing tool. It has automated testing module for detecting common web application vulnerabilities, and features geared at aiding manual penetration tests. For downloads and more information, visit the Grendel-Scan homepage . WIKTO – SECTOOLS TOP NETWORK SECURITY TOOLS Comment: (At least 50 characters. No markup is allowed. URLs will bemade into links.)
SECTOOLS.ORG TOP NETWORK SECURITY TOOLSSECURITY TOOLSSNIFFERSVULN SCANNERSWEB SCANNERSWIRELESSEXPLOITATION SecTools.Org: Top 125 Network Security Tools. For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form.This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the SAINT SECURITY SUITE SAINT Security Suite. vuln-scanners. SAINT is a commercial vulnerability assessment and penetration system. It was originally developed in the late 1990's as free UNIX tool based on the open source SATAN scanner. Later it went commercial and broadened into a whole suite of tools for vulnerability detection, exploitation, andasset management.
SECUNIA PSI
Secunia PSI (Personal Software Inspector) is a free security tool designed to detect vulnerable and out-dated programs and plug-ins that expose your PC to attacks. Attacks exploiting vulnerable programs and plug-ins are rarely blocked by traditional anti-virus programs. Secunia PSI checks only the machine it is running on, while itscommercial
PAROS PROXY
Paros proxy. A Java-based web proxy for assessing web application vulnerability. It supports editing/viewing HTTP/HTTPS messages on-the-fly to change items such as cookies and form fields. It includes a web traffic recorder, web spider, hash calculator, and a scanner for testing common web application attacks such as SQLinjection and cross
L0PHTCRACK – SECTOOLS TOP NETWORK SECURITY TOOLS L0phtCrack. pass-audit. L0phtCrack attempts to crack Windows passwords from hashes which it can obtain (given proper access) from stand-alone Windows workstations, networked servers, primary domain controllers, or Active Directory. In some cases it can sniff the hashes off the wire. It also has numerous methods of generating password guesses DUMPSEC – SECTOOLS TOP NETWORK SECURITY TOOLS DumpSec. DumpSec is a security auditing program for Microsoft Windows NT/XP/200x. It dumps the permissions (DACLs) and audit settings (SACLs) for the file system, registry, printers and shares in a concise, readable format, so that holes in system security are readily apparent. DumpSec also dumps user, group and replication information. THC HYDRA – SECTOOLS TOP NETWORK SECURITY TOOLS THC Hydra. When you need to brute force crack a remote authentication service, Hydra is often the tool of choice. It can perform rapid dictionary attacks against more than 50 protocols, including telnet, ftp, http, https, smb, several databases, and much more. Like THC Amap this release is from the fine folks at THC. NBTSCAN – SECTOOLS TOP NETWORK SECURITY TOOLS NBTScan is a program for scanning IP networks for NetBIOS name information (similar to what the Windows nbtstat tool provides against single hosts). It sends a NetBIOS status query to each address in a supplied range and lists received information in human readable form. For each responded host it lists IP address, NetBIOS computer name,logged
GRENDEL-SCAN
Grendel-Scan. Grendel-Scan is an open-source web application security testing tool. It has automated testing module for detecting common web application vulnerabilities, and features geared at aiding manual penetration tests. For downloads and more information, visit the Grendel-Scan homepage . WIKTO – SECTOOLS TOP NETWORK SECURITY TOOLS Comment: (At least 50 characters. No markup is allowed. URLs will bemade into links.)
SECTOOLS.ORG TOP NETWORK SECURITY TOOLS SecTools.Org: Top 125 Network Security Tools. For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form.This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the THC HYDRA – SECTOOLS TOP NETWORK SECURITY TOOLS THC Hydra. When you need to brute force crack a remote authentication service, Hydra is often the tool of choice. It can perform rapid dictionary attacks against more than 50 protocols, including telnet, ftp, http, https, smb, several databases, and much more. Like THC Amap this release is from the fine folks at THC. SUPERSCAN – SECTOOLS TOP NETWORK SECURITY TOOLS Superscan. port-scanners. Superscan is a free Windows-only closed-source TCP/UDP port scanner by Foundstone (now part of McAfee). It includes a variety of additional networking tools such as ping, traceroute, HTTP HEAD, and whois. Some functionality has been crippled by restrictions imposed by Microsoft in Windows XP SP2 and newerreleases.
CAIN AND ABEL
sniffers. UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing thenetwork
ANTIMALWARE
SecTools.Org: Top 125 Network Security Tools. For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form.This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the FIREWALLS – SECTOOLS TOP NETWORK SECURITY TOOLS SecTools.Org: Top 125 Network Security Tools. For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form.This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the RETINA – SECTOOLS TOP NETWORK SECURITY TOOLS Retina. vuln-scanners. Like Nessus, Retina's function is to scan all the hosts on a network and report on any vulnerabilities found. It was written by eEye, who are well known for their security research . For downloads and more information, visit the Retina homepage .Popularity.
TRAFFIC MONITORING TOOLS SecTools.Org: Top 125 Network Security Tools. For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form.This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the DIRBUSTER – SECTOOLS TOP NETWORK SECURITY TOOLS DirBuster searches for hidden pages and directories on a web server. Sometimes developers will leave a page accessible, but unlinked; DirBuster is meant to find these potential vulnerabilities. This is a Java application developed by OWASP . For downloads and more information, visit the DirBuster homepage . Popularity. #112, new! WIRESHARK – SECTOOLS TOP NETWORK SECURITY TOOLS Wireshark. Wireshark (known as Ethereal until a trademark dispute in Summer 2006) is a fantastic open source multi-platform network protocol analyzer. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail youneed.
* Nmap Security Scanner* Intro
* Ref Guide
* Install Guide
* Download
* Changelog
* Book
* Docs
* Security Lists
* Nmap Announce
* Nmap Dev
* Bugtraq
* Full Disclosure
* Pen Test
* Basics
* More
* Security Tools
* Password audit
* Sniffers
* Vuln scanners
* Web scanners
* Wireless
* Exploitation
* Packet crafters
* More
* Site News
* Advertising
* About/Contact
*
* Sponsors:
* Home
* About/Help
* Suggest a new tool*
SECTOOLS.ORG: TOP 125 NETWORK SECURITY TOOLS For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form . This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the Nmap Security Scanner , Ncat network connector , and Nping packet manipulator).
We're very impressed by the collective smarts of the security community and we highly recommend reading the whole list and investigating any tools you are unfamiliar with. Click any tool name for more details on that particular application, including the chance to read (and write) reviews. Many site elements are explained by tool tips if you hover your mouse over them. Enjoy! Sort by: popularity rating release date Tools 1–25 of 125 next page → (27) ★★★★½ WIRESHARK(#1, 1)
Wireshark (known as Ethereal until a trademark dispute in Summer 2006) is a fantastic open source multi-platform network protocol analyzer. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need. Wireshark has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types. A tcpdump -like console version named tshark is included. One word of caution is that Wireshark has suffered from dozens of remotely exploitable security holes, so stay up-to-date and be wary of running it on untrusted or hostile networks (such as security conferences).Read 44 reviews.
LATEST RELEASE: version 1.12.7 on Aug. 12, 2015 (4 years, 7 monthsago).
*
*
*
*
*
*
*
*
*
*
*
*
* sniffers
(11) ★★★★½ METASPLOIT(#2, 3)
Metasploit took the security world by storm when it was released in 2004. It is an advanced open-source platform for developing, testing, and using exploit code. The extensible model through which payloads, encoders, no-op generators, and exploits can be integrated has made it possible to use the Metasploit Framework as an outlet for cutting-edge exploitation research. It ships with hundreds of exploits, as you can see in their list of modules . This makes writing your own exploits easier, and it certainly beats scouring the darkest corners of the Internet for illicit shellcode of dubious quality. One free extra is Metasploitable, an intentionally
insecure Linux virtual machine you can use for testing Metasploit and other exploitation tools without hitting live servers. Metasploit was completely free, but the project was acquired by Rapid7 in 2009 and it soon sprouted commercial variants. The Framework itself is still free and open source, but they now also offer a free-but-limited Community edition, a more advanced Express edition ($5,000 per year per user), and a full-featured Pro edition. Other paid exploitation tools to consider are Core Impact (more expensive) and Canvas (less). The Metasploit Framework now includes an official Java-based GUIand also
Raphael Mudge's excellent Armitage . The Community, Express, and Pro editions have web-based GUIs. Read 19 reviews. LATEST RELEASE: version 4.11 on Dec. 18, 2014 (5 years, 3 monthsago).
*
*
*
*
*
*
*
*
*
*
*
*
* sploits
(16) ★★★ NESSUS(#3, 2)
Nessus is one of the most popular and capable vulnerability scanners, particularly for UNIX systems. It was initially free and open source, but they closed the source code in 2005 and removed the free "Registered Feed" version in 2008. It now costs $2,190 per year, which still beats many of its competitors. A free “Nessus Home” version is also available, though it is limited and only licensed forhome network use.
Nessus is constantly updated, with more than 70,000 plugins. Key features include remote and local (authenticated) security checks, a client/server architecture with a web-based interface, and an embedded scripting language for writing your own plugins or understanding the existing ones. Read 24 reviews. LATEST RELEASE: version 6.3.3 on March 16, 2015 (5 years ago).*
*
*
*
*
*
*
*
*
*
* vuln-scanners
(11) ★★★★ AIRCRACK(#4, 17)
Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. It implements the best known cracking algorithms to recover wireless keys once enough encrypted packets have been gathered. . The suite comprises over a dozen discrete tools, including airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files). Read 23 reviews. LATEST RELEASE: version 1.1 on April 24, 2010 (9 years, 11 monthsago).
*
*
*
*
*
*
*
*
*
*
*
* pass-audit
* wireless
(3) ★★★½ SNORT (#5, 2) This network intrusion detection and prevention system excels at traffic analysis and packet logging on IP networks. Through protocol analysis, content searching, and various pre-processors, Snort detects thousands of worms, vulnerability exploit attempts, port scans, and other suspicious behavior. Snort uses a flexible rule-based language to describe traffic that it should collect or pass, and a modular detection engine. Also check out the free Basic Analysis and Security Engine (BASE) , a web interface for analyzing Snort alerts. While Snort itself is free and open source, parent company SourceFire offers their VRT-certified rules for $499 per sensor per year and a complementary product line of software and appliances with more enterprise-level features. Sourcefire also offers a free 30-day delayed feed. Read 4 reviews. LATEST RELEASE: version 2.9.7.5 on July 23, 2015 (4 years, 8 monthsago).
*
*
*
*
*
*
*
*
*
*
*
* ids
(10) ★★★½ CAIN AND ABEL(#6, 3)
UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using dictionary, brute-force and cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. It is also well documented. Read 24 reviews.
LATEST RELEASE: version 4.9.56 on April 7, 2014 (5 years, 11 monthsago).
*
*
*
*
*
*
*
*
* pass-audit
* sniffers
(17) ★★★★ BACKTRACK(#7, 25)
This excellent bootable live CD Linux distribution comes from the merger of Whax and Auditor. It boasts a huge variety of Security and Forensics tools and provides a rich development environment. User modularity is emphasized so the distribution can be easily customized by the user to include personal scripts, additional tools, customized kernels, etc. BackTrack is succeeded by Kali Linux. Read 22 reviews.
LATEST RELEASE: version 5 R3 on Aug. 13, 2012 (7 years, 7 monthsago).
*
*
*
*
*
*
*
*
*
*
* sec-distros
(12) ★★★★½ NETCAT(#8, 4)
This simple utility reads and writes data across TCP or UDP network connections. It is designed to be a reliable back-end tool to use directly or easily drive by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need, including port binding to accept incoming connections. The original Netcat was releasedby Hobbit in 1995,
but it hasn't been maintained despite its popularity. It can sometimes even be hard to find a copy of the v1.10 source code . The flexibility and usefulness of this tool prompted the Nmap Project to produce Ncat , a modern reimplementation which supports SSL, IPv6, SOCKS and http proxies, connection brokering, and more. Other takes on this classic tool include the amazingly versatile Socat, OpenBSD's nc
, Cryptcat
, Netcat6
, pnetcat
, SBD
, and so-called GNU Netcat. Read 21 reviews.
LATEST RELEASE: version 1.10 on March 20, 1996 (24 years ago).*
*
*
*
*
*
*
*
*
*
*
* general
* packet-crafters
(3) ★★★★ TCPDUMP(#9, 1)
Tcpdump is the network sniffer we all used before (Wireshark ) came on the scene, and many of us continue to use it frequently. It may not have the bells and whistles (such as a pretty GUI and parsing logic for hundreds of application protocols) that Wireshark has, but it does the job well and with less security risk. It also requires fewer system resources. While Tcpdump doesn't receive new features often, it is actively maintained to fix bugs and portability problems. It is great for tracking down network problems or monitoring activity. There is a separate Windows port named WinDump . tcpdump is the source of theLibpcap /WinPcap
packet capture library, which is used by Nmap and many other tools. Read 4 reviews. LATEST RELEASE: version 4.7.4 on April 22, 2015 (4 years, 11 monthsago).
*
*
*
*
*
*
*
*
*
*
*
* sniffers
(6) ★★★★ JOHN THE RIPPER(#10, UNCHANGED)
John the Ripper is a fast password cracker for UNIX/Linux and Mac OS X.. Its primary purpose is to detect weak Unix passwords, though it supports hashes for many other platforms as well. There is an official free version, a community-enhanced version (with many contributed patches but not as much quality assurance), and an inexpensive pro version. You will probably want to start with some wordlists, whichyou can find here
, here
, or here
. Read 15 reviews.
LATEST RELEASE: version 1.8.0 on May 30, 2013 (6 years, 9 monthsago).
*
*
*
*
*
*
*
*
*
*
*
* pass-audit
(2) ★★★★★ KISMET(#11, 4)
Kismet is a console (ncurses) based 802.11 layer-2 wireless network detector, sniffer, and intrusion detection system. It identifies networks by passively sniffing (as opposed to more active tools such as NetStumbler ), and can even decloak hidden (non-beaconing) networks if they are in use. It can automatically detect network IP blocks by sniffing TCP, UDP, ARP, and DHCP packets, log traffic in Wireshark /tcpdump compatible format, and even plot detected networks and estimated ranges on downloaded maps. As you might expect, this tool is commonly used for wardriving . Oh, and also warwalking , warflying, and
warskating
,
etc. Read 2 reviews. LATEST RELEASE: version Kismet-2013-03-R1b on April 8, 2013 (6 years,11 months ago).
*
*
*
*
*
*
*
*
*
*
*
* sniffers
* wireless
(2) ★★★★★ OPENSSH/PUTTY/SSH(#12, 2)
SSH (Secure Shell) is the now ubiquitous program for logging into or executing commands on a remote machine. It provides secure encrypted communications between two untrusted hosts over an insecure network, replacing the hideously insecure telnet/rlogin/rsh alternatives. Most UNIX users run the open source OpenSSH server and client. Windows users often prefer the free PuTTYclient, which is
also available for many mobile devices, and WinSCP . Other Windows users prefer the nice terminal-based port of OpenSSH that comes with Cygwin . There are dozens of other free andproprietary clients
to consider
as well. Read 2 reviews.*
*
*
*
*
*
*
*
*
*
*
*
*
*
* crypto
(22) ★★★★½ BURP SUITE(#13, 63)
Burp Suite is an integrated platform for attacking web applications. It contains a variety of tools with numerous interfaces between them designed to facilitate and speed up the process of attacking an application. All of the tools share the same framework for handling and displaying HTTP messages, persistence, authentication, proxies, logging, alerting and extensibility. There is a limited free version and also Burp Suite Professional ($299 per user per year). Read 26reviews.
LATEST RELEASE: version 1.4.01 on June 3, 2011 (8 years, 9 monthsago).
*
*
*
*
*
*
*
*
*
* web-scanners
(22) ★★★★½ NIKTO(#14, 2)
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1200 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software. Scan items and plugins are frequently updated and can be automatically updated. Read37 reviews.
LATEST RELEASE: version 2.1.4 on Feb. 20, 2011 (9 years, 1 monthago).
*
*
*
*
*
*
*
*
*
*
* web-scanners
(4) ★★★★ HPING(#15, 9)
This handy little utility assembles and sends custom ICMP, UDP, or TCP packets and then displays any replies. It was inspired by the ping command, but offers far more control over the probes sent. It also has a handy traceroute mode and supports IP fragmentation. Hping is particularly useful when trying to traceroute/ping/probe hosts behind a firewall that blocks attempts using the standard utilities. This often allows you to map out firewall rule sets. It is also great for learning more about TCP/IP and experimenting with IP protocols. Unfortunately, it hasn't been updated since 2005. The Nmap Project created and maintains Nping , a similar program with more modern features such as IPv6 support, and a uniqueecho mode . Read 6
reviews.
LATEST RELEASE: version hping3-20051105 on Nov. 5, 2005 (14 years,4 months ago).
*
*
*
*
*
*
*
*
*
*
*
* packet-crafters
(13) ★★★★½ ETTERCAP(#16, 5)
Ettercap is a suite for man in the middle attacks on LAN. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols (even ciphered ones) and includes many feature for network and host analysis. Read 25 reviews. LATEST RELEASE: version 0.8.2-Ferri on March 14, 2015 (5 years ago).*
*
*
*
*
*
*
*
*
*
*
*
* sniffers
* traffic-monitors
(2) ★★★★★ SYSINTERNALS(#17, 7)
Sysinternals provides many small windows utilities that are quite useful for low-level windows hacking. Some are free of cost and/or include source code, while others are proprietary. Survey respondents were most enamored with:* ProcessExplorer
for keeping an eye on the files and directories open by any process (like lsof on UNIX).* PsTools
for managing (executing, suspending, killing, detailing) local andremote processes.
* Autoruns
for discovering what executables are set to run during system boot upor login.
* RootkitRevealer
for detecting registry and file system API discrepancies that may indicate the presence of a user-mode or kernel-mode rootkit.* TCPView
,
for viewing TCP and UDP traffic endpoints used by each process (likeNetstat on UNIX).
Many of the Sysinternals tools originally came with source code and there were even Linux versions. Microsoft acquired Sysinternalsin July 2006,
promising that “Customers will be able to continue building on Sysinternals' advanced utilities, technical information and source code”. Less than four months later, Microsoft removed most of that source code.Read 2 reviews.
LATEST RELEASE: Feb. 4, 2011 (9 years, 1 month ago).*
*
*
*
*
*
*
*
*
* rootkit-detectors
(15) ★★★½ W3AF(#18, NEW! )
W3af is an extremely popular, powerful, and flexible framework for finding and exploiting web application vulnerabilities. It is easy to use and extend and features dozens of web assessment and exploitation plugins. In some ways it is like a web-focused Metasploit. Read 18 reviews.
LATEST RELEASE: version 1.1 on Oct. 11, 2011 (8 years, 5 monthsago).
*
*
*
*
*
*
*
*
*
*
*
*
* fuzzers
* sploits
* web-scanners
(30) ★★★★ OPENVAS(#19, NEW! )
OpenVAS is a vulnerability scanner that was forked from the last free version of Nessus after that tool went proprietary in 2005. OpenVAS plugins are still written in the Nessus NASL language. The project seemed dead for a while, but development has restarted.Read 37 reviews.
LATEST RELEASE: version 8.0 on April 2, 2015 (4 years, 11 monthsago).
*
*
*
*
*
*
*
*
*
*
*
* vuln-scanners
(8) ★★★★★ SCAPY(#20, 8)
Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. Note that Scapy is a very low-level tool—you interact with it using the Python programming language. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Read 11 reviews. LATEST RELEASE: version 2.2.0 on Feb. 28, 2011 (9 years ago).*
*
*
*
*
*
*
*
*
*
*
* packet-crafters
(2) ★★★★★
PING/TELNET/DIG/TRACEROUTE/WHOIS/NETSTAT (#21, 8) While there are many advanced high-tech tools out there to assist in security auditing, don't forget about the basics! Everyone should be very familiar with these tools as they come with most operating systems (except that Windows omits whois and uses the name tracert). They can be very handy in a pinch, although more advanced functionality is available from Hping and Netcat. Read 4 reviews.
*
*
*
*
*
*
*
*
* general
(16) ★★★★ THC HYDRA(#22, 7)
When you need to brute force crack a remote authentication service, Hydra is often the tool of choice. It can perform rapid dictionary attacks against more than 50 protocols, including telnet, ftp, http, https, smb, several databases, and much more. Like THC Amap this release is from the fine folks at THC . Other online crackers are Medusa and Ncrack . The Nmap Security Scanner also contains many online brute force password cracking modules . Read58 reviews.
LATEST RELEASE: version 8.2 on June 16, 2016 (3 years, 9 monthsago).
*
*
*
*
*
*
*
*
*
*
*
* pass-audit
NO RATING PERL/PYTHON/RUBY(#23, 3)
While many canned security tools are available on this site for handling common tasks, scripting languages allow you to write your own (or modify existing ones) when you need something more custom. Quick, portable scripts can test, exploit, or even fix systems. Archives like CPAN are filled with modules such as Net::RawIP and protocol implementations to make your tasks even easier. Many security tools use scripting languages heavily for extensibility. For example Scapy interaction is through a Python interpreter, Metasploit modules are written in Ruby, and Nmap's scripting engine uses Lua. Read 1 review.*
*
*
*
*
*
*
*
*
*
*
*
* general
(2) ★★½ PAROS PROXY(#24, 8)
A Java-based web proxy for assessing web application vulnerability. It supports editing/viewing HTTP/HTTPS messages on-the-fly to change items such as cookies and form fields. It includes a web traffic recorder, web spider, hash calculator, and a scanner for testing common web application attacks such as SQL injection and cross-site scripting. Read 6 reviews. LATEST RELEASE: version 3.2.13 on Aug. 8, 2006 (13 years, 7 monthsago).
*
*
*
*
*
*
*
*
*
*
*
* web-proxy
* web-scanners
(2) ★★★★½ NETSTUMBLER(#25, 7)
Netstumbler is the best known Windows tool for finding open wireless access points ("wardriving"). They also distribute a WinCE version for PDAs and such named MiniStumbler. The tool is
currently free but Windows-only and no source code is provided. It uses a more active approach to finding WAPs than passive sniffers such as Kismet or KisMAC . Read 3 reviews. LATEST RELEASE: version 0.4.0 on April 1, 2004 (15 years, 11 monthsago).
*
*
*
*
*
*
*
*
* sniffers
* wireless
Tools 1–25 of 125 next page →CATEGORIES
* Antimalware (3)
* Application-specific scanners (3) * Web browser–related (4) * Encryption tools (8)* Debuggers (5)
* Firewalls (2)
* Forensics (4)
* Fuzzers (4)
* General-purpose tools (8) * Intrusion detection systems (6) * Packet crafting tools (6) * Password auditing (12)* Port scanners (4)
* Rootkit detectors (5) * Security-oriented operating systems (5) * Packet sniffers (14) * Vulnerability exploitation tools (11) * Traffic monitoring tools (10) * Vulnerability scanners (11)* Web proxies (4)
* Web vulnerability scanners (20) * Wireless tools (5)×
search
Details
Copyright © 2024 ArchiveBay.com. All rights reserved. Terms of Use | Privacy Policy | DMCA | 2021 | Feedback | Advertising | RSS 2.0