Sort by new | name

Armory

Showing 46 - 60 of 97

RainbowCrack

RainbowCrack is a general propose implementation of Philippe Oechslin's faster time-memory trade-off technique. In short, the RainbowCrack tool is a hash cracker. A traditional brute force cracker try all possible plaintexts one by one in cracking time. It is time consuming to break complex password in this way. The idea ...

Password Cracking


KisMAC

KisMAC is an opensource and free stumbler/scanner application for Mac OS X. It has an advantage over MacStumbler, iStumbler, and NetStumbler in that it uses monitor mode and passive scanning. KisMAC supports several third party PCMCIA cards - Orinoco, PrismII, Cisco Aironet, Atheros and PrismGT. USB Prism2 is supported as ...

Enumeration Wireless


Angry IP Scanner

Angry IP Scanner is an open-source and cross-platform network scanner designed to be fast and simple to use. It scans IP addresses and ports as well as has many other features. It is widely used by network administrators and just curious users around the world, including large and small enterprises, ...

Enumeration


ike-scan

ike-scan is a command-line tool that uses the IKE protocol to discover, fingerprint and test IPsec VPN servers.

Enumeration Packet Analysis


arpwatch

arpwatch is an open-source software that monitors a computer network for ARP-activity. It generates a log of IP address-MAC address pairings along with a timestamp when the pairing appeared on the network. The first and foremost reason to monitor ARP activity is to detect ARP spoofing. It is developed by ...

Intrusion Detection Network Utilities System Monitoring


nemesis

Nemesis is a command-line network packet injection utility for UNIX-like and Windows systems. You might think of it as an EZ-bake packet oven or a manually controlled IP stack. With Nemesis, it is possible to generate and transmit packets from the command line or from within a shell script. Nemesis ...

Packet Crafting


Yersinia

Yersinia is a network tool designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. Currently, there are some network protocols implemented, but others are coming (tell us which one is your preferred). ...

Exploitation Packet Crafting Spoofing


Nagios

Nagios is a host and service monitor designed to inform you of network problems before your clients, end-users or managers do. It has been designed to run under the Linux operating system, but works fine under most *NIX variants as well. The monitoring daemon runs intermittent checks on hosts and ...

Network Monitoring System Monitoring


VMware Workstation

VMware Workstation is a virtual machine software suite for x86 and x86-64 computers from VMware, previously a division of EMC Corporation. This software suite allows users to set up multiple x86 and x86-64 virtual computers and to use one or more of these virtual machines simultaneously with the hosting operating ...

Virtualization


fragroute

fragroute intercepts, modifies, and rewrites egress traffic destined for the specified host, implementing most of the attacks described in the Secure Networks "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection'' paper of January 1998. Unlike fragrouter(8), this program only affects packets originating from the local machine destined for ...

Network Utilities Packet Crafting Vulnerability Scanning


Cacti

Cacti is a complete network graphing solution designed to harness the power of RRDTool's data storage and graphing functionality. Cacti provides a fast poller, advanced graph templating, multiple data acquisition methods, and user management features out of the box. All of this is wrapped in an intuitive, easy to use ...

Network Monitoring System Monitoring


socat

socat is a relay for bidirectional data transfer between two independent data channels. Each of these data channels may be a file, pipe, device (serial line etc. or a pseudo terminal), a socket (UNIX, IP4, IP6 - raw, UDP, TCP), an SSL socket, proxy CONNECT connection, a file descriptor (stdin ...

Network Utilities


SolarWinds Orion

Orion is a commercial network management system produced by SolarWinds. It is capable of syslog, SNMP, NetFlow, and other types of monitoring. Additionally, it can be expanded with purchasable modules.

Network Monitoring System Monitoring


nipper

Nipper processes network device configuration files, performs a security audit and outputs a security report with recommendations and a configuration report. Nipper supports a variety of devices from Cisco, Juniper, CheckPoint, Nortel and SonicWALL. Reports can be generated in HTML, XML, LaTeX, or plain text. Check out the online version ...

Vulnerability Scanning


EIGRP-tools

EIGRP-tools is a custom EIGRP packet generator and sniffer combined. It was developed to test the security and overall operation quality of the EIGRP routing protocol. Using this tool requires you to have the requisite background knowledge of EIGRP, packets structure/types, alongside a good working background of the Layer 3 ...

Exploitation Packet Analysis Packet Crafting


Showing 46 - 60 of 97