Sort by new | name

Armory

Showing 1 - 15 of 75

AD Explorer

Active Directory Explorer (AD Explorer) is an advanced Active Directory (AD) viewer and editor. You can use AD Explorer to easily navigate an AD database, define favorite locations, view object properties and attributes without having to open dialog boxes, edit permissions, view an object's schema, and execute sophisticated searches that ...

Enumeration Windows Sysinternals


Advanced IP Address Calculator

Advanced IP Address Calculator is an easy-to-use IP subnet calculator that lets you calculate every aspect of your subnet configuration in a few mouse clicks! The calculator generates a color-coded bit map, breaking down the network, subnet, and host portion. It shows you the subnet host address range, the subnet ...

Network Utilities


Advanced IP Scanner

Advanced IP Scanner is a fast, robust and easy-to-use IP scanner for Windows. It easily lets you have various types of information about local network computers in a few seconds! Advanced IP Scanner gives you one-click access to many useful functions - remote shutdown and wake up, Radmin integration and ...

Network Utilities


Advanced LAN Scanner

Advanced LAN Scanner is a small, easy-to-use, highly configurable network scanner for Win32. And it's VERY fast. Advanced LAN Scanner uses multithreading so you can scan more than 1000 elements per second! If used to scan ports, Advanced LAN Scanner can scan all 65536 ports in less than a minute! ...

Network Utilities


Advanced Port Scanner

Advanced Port Scanner is a small, fast, robust and easy-to-use port scanner for Win32 platform. It uses a multithread technique, so on fast machines you can scan ports very fast. Also, it contains descriptions for common ports, and can perform scans on predefined port ranges.

Network Utilities


AirSnort

AirSnort is a wireless LAN (WLAN) tool which recovers encryption keys. AirSnort operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. 802.11b, using the Wired Equivalent Protocol (WEP), is crippled with numerous security flaws. Most damning of these is the weakness described in " ...

Exploitation Password Cracking Wireless


Angry IP Scanner

Angry IP Scanner is an open-source and cross-platform network scanner designed to be fast and simple to use. It scans IP addresses and ports as well as has many other features. It is widely used by network administrators and just curious users around the world, including large and small enterprises, ...

Enumeration


AsItHappens Network Statistic Collector

AsItHappens is a real-time network statistic collector and grapher. It collects data from devices over a network and displays them on a graph, optionally storing collected data in a database for later retrieval. Current collection types include network response, bandwidth, processor usage, memory usage, Cisco NBAR, Cisco NetFlow and arbitrary ...

Network Monitoring


AutoRuns

This utility, which has the most comprehensive knowledge of auto-starting locations of any startup monitor, shows you what programs are configured to run during system bootup or login, and shows you the entries in the order Windows processes them. These programs include ones in your startup folder, Run, RunOnce, and ...

System Monitoring Windows Sysinternals


BackTrack

BackTrack is the most Top rated linux live distribution focused on penetration testing. With no installation whatsoever, the analysis platform is started directly from the CD-Rom and is fully accessible within minutes. It's evolved from the merge of the two wide spread distributions - Whax and Auditor Security Collection. By ...

Enumeration Exploitation Password Cracking Vulnerability Scanning


BGPlay

BGPlay is a Java application which displays animated graphs of the routing activity of a certain prefix within a specified time interval. Its graphical nature makes it much easier to understand how BGP updates affect the routing of a specific prefix than by analyzing the updates themselves. The BGPlay database ...

Network Monitoring


Burp Suite

Burp Suite is an integrated platform for attacking web applications. It contains all of the Burp tools with numerous interfaces between them designed to facilitate and speed up the process of attacking an application. All tools share the same robust framework for handling HTTP requests, authentication, downstream proxies, logging, alerting ...

Vulnerability Scanning Web Applications


Cain & Abel

Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords ...

Password Cracking


Cisco Device Info

Cisco Device Info (CDI) is a Windows application to retrieve runtime information from Cisco equipment such as routers and switches. This is achieved using the SNMP protocol, supporting SNMP versions 1 through 3. CDI has been tested against hundreds of routers in productions environments around the globe. It is free ...

Network Utilities


EtherApe

EtherApe is a graphical network monitor for Unix modeled after etherman. Featuring link layer, IP and TCP modes, it displays network activity graphically. Hosts and links change in size with traffic. Color coded protocols display. It supports Ethernet, FDDI, Token Ring, ISDN, PPP and SLIP devices. It can filter traffic ...

Network Utilities Packet Analysis System Monitoring


Showing 1 - 15 of 75