Sort by new | name

Armory

Showing 1 - 15 of 118

aircrack

aircrack is an 802.11 WEP and WPA-PSK key cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, thus making the attack much faster compared to other WEP cracking tools. In fact, aircrack is ...

Encryption Password Cracking Wireless


AirSnort

AirSnort is a wireless LAN (WLAN) tool which recovers encryption keys. AirSnort operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. 802.11b, using the Wired Equivalent Protocol (WEP), is crippled with numerous security flaws. Most damning of these is the weakness described in " ...

Exploitation Password Cracking Wireless


Angry IP Scanner

Angry IP Scanner is an open-source and cross-platform network scanner designed to be fast and simple to use. It scans IP addresses and ports as well as has many other features. It is widely used by network administrators and just curious users around the world, including large and small enterprises, ...

Enumeration


arping

arping maps MAC addresses to IP addresses (or vice versa) by broadcasting ARP queries.

Enumeration Network Utilities


arpwatch

arpwatch is an open-source software that monitors a computer network for ARP-activity. It generates a log of IP address-MAC address pairings along with a timestamp when the pairing appeared on the network. The first and foremost reason to monitor ARP activity is to detect ARP spoofing. It is developed by ...

Intrusion Detection Network Utilities System Monitoring


AsItHappens Network Statistic Collector

AsItHappens is a real-time network statistic collector and grapher. It collects data from devices over a network and displays them on a graph, optionally storing collected data in a database for later retrieval. Current collection types include network response, bandwidth, processor usage, memory usage, Cisco NBAR, Cisco NetFlow and arbitrary ...

Network Monitoring


BackTrack

BackTrack is the most Top rated linux live distribution focused on penetration testing. With no installation whatsoever, the analysis platform is started directly from the CD-Rom and is fully accessible within minutes. It's evolved from the merge of the two wide spread distributions - Whax and Auditor Security Collection. By ...

Enumeration Exploitation Password Cracking Vulnerability Scanning


BGPlay

BGPlay is a Java application which displays animated graphs of the routing activity of a certain prefix within a specified time interval. Its graphical nature makes it much easier to understand how BGP updates affect the routing of a specific prefix than by analyzing the updates themselves. The BGPlay database ...

Network Monitoring


Bit-Twist

With Bit-Twist, you can now regenerate your captured traffic onto a live network! Packets are generated from tcpdump trace file (.pcap file). Bit-Twist also comes with a comprehensive trace file editor to allow you to change the contents of a trace file. Generally, packet generator is useful in simulating networking ...

Packet Analysis Packet Crafting


Bluebugger

bluebugger is an implementation of the bluebug technique which was discovered by Martin Herfurt.

Exploitation Wireless


Burp Suite

Burp Suite is an integrated platform for attacking web applications. It contains all of the Burp tools with numerous interfaces between them designed to facilitate and speed up the process of attacking an application. All tools share the same robust framework for handling HTTP requests, authentication, downstream proxies, logging, alerting ...

Vulnerability Scanning Web Applications


Cacti

Cacti is a complete network graphing solution designed to harness the power of RRDTool's data storage and graphing functionality. Cacti provides a fast poller, advanced graph templating, multiple data acquisition methods, and user management features out of the box. All of this is wrapped in an intuitive, easy to use ...

Network Monitoring System Monitoring


cdpr

cdpr is used to decode a Cisco Disovery Protocol (CDP) packet, by default it will report the device ID, the IP Address (of the device), and the port number that the machine is connected to. Optionally it will decode the entire CDP packet.

Enumeration


chntpw

chntpw is an offline NT password and registry editor. It can be used to blank or reset passwords on Windows NT/2000/XP/2003 machines, as well as manipulate the registry. It is provided primarily as a boot CD image, but can also be installed on a permanent Linux system.

Forensics Password Cracking


Curl

Powerful tool used by many data centers to check the L7 connectivity.. I saw this missing in your list.

Network Monitoring


Showing 1 - 15 of 118