- AIEngine 1.0 AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.
- Maligno 1.4 Maligno is an open source penetration testing tool written in python, that serves Metasploit payloads. It generates shellcode with msfvenom and transmits it over HTTP or HTTPS. The shellcode is encrypted with AES and encoded with Base64 prior to transmission.
- Clam AntiVirus Toolkit 0.98.5 Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are. […]
- Capstone 3.0 Capstone is a multi-architecture, multi-platform disassembly framework. It has a simple and lightweight architecture-neutral API, thread-safe by design, provides details on disassembled instruction, and more.
- DAVOSET 1.2.3 DAVOSET is a tool for committing distributed denial of service attacks using execution on other sites.
- Fwknop Port Knocking Utility 2.6.4 fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect servic. […]
- Packet Fence 4.5.1 PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration. […]
- Advertisement: SolarWinds Log & Event Manager Need root-cause analysis, log management, and compliance monitoring? SolarWinds(r) LEM is smart security for any IT pro. Download a free trial
- Hesperbot Detection Scanner 1.0 Hesperbot Scanner is a windows binary that is able to detect the Hesperbot banking trojan by fingerprinting memory and looking for things that traditional antivirus software fails to catch early during the malware campaigns.
- DAVOSET 1.2.2 DAVOSET is a tool for committing distributed denial of service attacks using execution on other sites.
- ROP Gadget Tool 5.3 This tool lets you search your gadgets on your binaries (ELF format) to facilitate your ROP exploitation. The gadgets are found on executable segments.
- Web-Based Firewall Logging Tool 1.01 Webfwlog is a Web-based firewall log reporting and analysis tool. It allows users to design reports to use on logged firewall data in whatever configuration they desire. Included are sample reports as a starting point. Reports can be sorted with a single click, or “drilled-down” all the way to the p. […]
- Lynis Auditing Tool 1.6.4 Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated audit. […]
- SSLsplit 0.4.9 SSLsplit is a tool for man-in-the-middle attacks against SSL/TLS encrypted network connections. Connections are transparently intercepted through a network address translation engine and redirected to SSLsplit. SSLsplit terminates SSL/TLS and initiates a new SSL/TLS connection to the original destin. […]
- I2P 0.9.16 I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.
- Samhain File Integrity Checker 3.1.3 Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding re. […]
- Dashlane 11/27/14 – Automate and simplify your everyday online life.
- Real Hide IP 11/26/14 – Hide your IP to protect your privacy on the Internet.
- PC Tattletale Recorder 11/26/14 – Monitor and record PC activities in stealth mode.
- 9-lab Removal Tool x86 11/26/14 – Protect your computer against all forms of cyber threats.
- Combofix 11/26/14 – Scan for spyware and remove it from your computer.
- S.S.E. File Encryptor for PC 11/25/14 – Encrypt your private and confidential files or whole folders.
- System Security 2009 11/25/14 – Keep away unwanted users from computer.
- PDF Encrypt 11/25/14 – Encrypt existing PDFs,set permissions and user and owner password.
- HideMe 11/24/14 – Hide your IP address, protect your online privacy, and bypass firewalls.
- Classroom Spy Professional 11/24/14 – Monitor PC activities of your kids or employees and lock Internet access when necessarily.