Sort by new | name


Showing 31 - 45 of 97


WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, ...

Web Applications

VMware Workstation

VMware Workstation is a virtual machine software suite for x86 and x86-64 computers from VMware, previously a division of EMC Corporation. This software suite allows users to set up multiple x86 and x86-64 virtual computers and to use one or more of these virtual machines simultaneously with the hosting operating ...



Cacti is a complete network graphing solution designed to harness the power of RRDTool's data storage and graphing functionality. Cacti provides a fast poller, advanced graph templating, multiple data acquisition methods, and user management features out of the box. All of this is wrapped in an intuitive, easy to use ...

Network Monitoring System Monitoring

Web Developer

Web Developer is a nifty Firefox extension which provides some very handy tools for web developers, including CSS manipulation, object highlighting, code validation, browser resizing, and lots more.

Browser Plugins


RainbowCrack is a general propose implementation of Philippe Oechslin's faster time-memory trade-off technique. In short, the RainbowCrack tool is a hash cracker. A traditional brute force cracker try all possible plaintexts one by one in cracking time. It is time consuming to break complex password in this way. The idea ...

Password Cracking


BGPlay is a Java application which displays animated graphs of the routing activity of a certain prefix within a specified time interval. Its graphical nature makes it much easier to understand how BGP updates affect the routing of a specific prefix than by analyzing the updates themselves. The BGPlay database ...

Network Monitoring


lsof is a Unix-specific diagnostic tool. Its name stands for LiSt Open Files, and it does just that. It lists information about any files that are open by processes currently running on the system. It can also list communications open by each process.

Enumeration System Monitoring


arping maps MAC addresses to IP addresses (or vice versa) by broadcasting ARP queries.

Enumeration Network Utilities


TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the ...



Written and maintained by Fyodor Yarochkin, Meder Kydyraliev and Ofir Arkin, Xprobe (I & II) is an active OS fingerprinting tools based on Ofir Arkin’s ICMP Usage In Scanning Research project.Xprobe is an alternative to some tools which are heavily dependent upon the usage of the TCP protocol for remote ...



aircrack is an 802.11 WEP and WPA-PSK key cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, thus making the attack much faster compared to other WEP cracking tools. In fact, aircrack is ...

Encryption Password Cracking Wireless


A very fast network logon cracker which support many different services. Currently this tool supports: TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, SMB, SMBNT, MS-SQL, MYSQL, REXEC, RSH, RLOGIN, CVS, SNMP, SMTP-AUTH, SOCKS5, VNC, POP3, IMAP, NNTP, PCNFS, ICQ, SAP/R3, LDAP2, LDAP3, Postgres, Teamspeak, Cisco auth, Cisco enable, LDAP2, Cisco AAA (incorporated ...

Password Cracking


The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library managed by a worldwide community of volunteers that use the ...



Nipper processes network device configuration files, performs a security audit and outputs a security report with recommendations and a configuration report. Nipper supports a variety of devices from Cisco, Juniper, CheckPoint, Nortel and SonicWALL. Reports can be generated in HTML, XML, LaTeX, or plain text. Check out the online version ...

Vulnerability Scanning


A command-line packet sniffer capable of dumping varying amounts of detail per packet to stdout, in real time. Originally written for UNIX-like systems, a port for Microsoft Windows was created and named WinDump.

Packet Analysis

Showing 31 - 45 of 97