The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all arou...
Netsparker v3.5.5 - Web Application Security Scanner
Netsparker Web Application Security Scanner can find and report web application vulnerabilities such as SQL Injection and Cross-site Scrip...
ParanoiDF - PDF Analysis Suite: Password cracking, redaction recovery, DRM removal, malicious JavaScript extraction, and more
The swiss army knife of PDF Analysis Tools. Based on peepdf - http://peepdf.eternal-todo.com . Features Interactive Console: Type "hel...
Suricata IDPE 2.0.3 - Open Source Next Generation Intrusion Detection and Prevention Engine
The Suricata Engine is an Open Source Next Generation Intrusion Detection and Prevention Engine . This engine is not intended to just repla...
SAMHAIN v3.1.2 - File Integrity Checker / Host-Based Intrusion Detection System
The Samhain host-based intrusion detection system (HIDS) provides file integrity checking and log file monitoring/analysis , ...
SimpleProgramDebugger - Simple program debugger that shows all debug events
SimpleProgramDebugger is a simple debugging tool for Windows that attaches to existing running program or starts a new program in debuggin...
PWGen - Generator of cryptographically-strong passwords
PWGen is a professional password generator capable of creating large amounts of cryptographically- secure passwords or passphrases consis...
XCat - Tool that aides in the exploitation of blind XPath injection vulnerabilities
XCat is a command line program that aides in the exploitation of blind XPath injection vulnerabilities. It can be used to retrieve the whole...
NTFSLinksView - View NTFS symbolic links and junction points
Starting from Windows Vista, Microsoft uses symbolic links and junction points of NTFS file system in order to make changes in the folders...