Lynis is an open source security auditing tool . Primary goal is to help users with auditing and hardening of Unix and Linux based systems...
Nmap 6.47 - Free Security Scanner For Network Exploration & Security Audits
Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may ...
WiFi software Acrylic WiFi Free v2.0 - Real-time WLAN information and network analysis
New Acrylic WiFi software update. WiFi software for network analysis has gone through many changes since the first free version and final...
dos_ssh - Use BIOS ram hacks to make a SSH server
Use BIOS ram hacks to make a SSH server out of any INT 10 13h app (MS-DOS is one of those) You can find a demo Youtube Video here below: Dow...
Mobius - Forensic Framework written in Python/GTK
Mobius Forensic Toolkit is a forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface f...
CipherShed - Secure Encryption Software (fork of the TrueCrypt Project)
CipherShed is free (as in free-of-charge and free-speech ) encryption software for keeping your data secure and private. It started as a f...
Viproy v2.0 - VoIP Penetration Testing and Exploitation Kit
Viproy Voip Pen-Test Kit provides penetration testing modules for VoIP networks. It supports signalling analysis for SIP and Skinny protoco...
Passera - Tool to generate strong unique passwords for each website
A simple tool that allows users to have strong unique passwords for each website, without the need to store them either locally or with an o...
SearchMyFiles v2.50 - Alternative to 'Search For Files And Folders' module of Windows + Duplicates Search
SearchMyFiles is an alternative to the standard "Search For Files And Folders" module of Windows. It allows you to easily search ...
WAF-FLE v0.6.4 - OpenSource ModSecurity Console
WAF-FLE is a OpenSource ModSecurity Console, allows modsecurity admin to store, view and search events sent by sensors using a graphical d...
GnuPG - Complete and free implementation of the OpenPGP
GnuPG is a complete and free implementation of the OpenPGP standard as defined by RFC4880 (also known as PGP ). GnuPG allows to encrypt and...
FBCacheView v1.03 - View Facebook images stored in the cache of your Web browser
FBCacheView is a simple tool that scans the cache of your Web browser (Internet Explorer, Firefox, or Chrome), and lists all images displa...
Tor Browser 3.6.4 and 4.0-alpha-1 are released
The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all arou...
Netsparker v3.5.5 - Web Application Security Scanner
Netsparker Web Application Security Scanner can find and report web application vulnerabilities such as SQL Injection and Cross-site Scrip...
ParanoiDF - PDF Analysis Suite: Password cracking, redaction recovery, DRM removal, malicious JavaScript extraction, and more
The swiss army knife of PDF Analysis Tools. Based on peepdf - http://peepdf.eternal-todo.com . Features Interactive Console: Type "hel...
Suricata IDPE 2.0.3 - Open Source Next Generation Intrusion Detection and Prevention Engine
The Suricata Engine is an Open Source Next Generation Intrusion Detection and Prevention Engine . This engine is not intended to just repla...
SAMHAIN v3.1.2 - File Integrity Checker / Host-Based Intrusion Detection System
The Samhain host-based intrusion detection system (HIDS) provides file integrity checking and log file monitoring/analysis , ...
SimpleProgramDebugger - Simple program debugger that shows all debug events
SimpleProgramDebugger is a simple debugging tool for Windows that attaches to existing running program or starts a new program in debuggin...
PWGen - Generator of cryptographically-strong passwords
PWGen is a professional password generator capable of creating large amounts of cryptographically- secure passwords or passphrases consis...
XCat - Tool that aides in the exploitation of blind XPath injection vulnerabilities
XCat is a command line program that aides in the exploitation of blind XPath injection vulnerabilities. It can be used to retrieve the whole...
NTFSLinksView - View NTFS symbolic links and junction points
Starting from Windows Vista, Microsoft uses symbolic links and junction points of NTFS file system in order to make changes in the folders...
Shellter v1.7 - Dynamic ShellCode Injector Tool
Shellter is a dynamic shellcode injection tool, and probably the first dynamic PE infector ever created. It can be used in order to inject s...
Unicorn - Tool for using a PowerShell downgrade attack and inject shellcode straight into memory
Magic Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber...
HoneyDrive 3 - The Premier Honeypot Linux Distro
HoneyDrive is the premier honeypot Linux distro. It is a virtual appliance (OVA) with Xubuntu Desktop 12.04.4 LTS edition installed. It co...