Sort by new | name

Armory

Showing 46 - 60 of 97

Burp Suite

Burp Suite is an integrated platform for attacking web applications. It contains all of the Burp tools with numerous interfaces between them designed to facilitate and speed up the process of attacking an application. All tools share the same robust framework for handling HTTP requests, authentication, downstream proxies, logging, alerting ...

Vulnerability Scanning Web Applications


VoIP Hopper

VoIP Hopper is a GPLv3 licensed security tool, written in C, that rapidly runs a VLAN Hop into the Voice VLAN on specific Ethernet switches. VoIP Hopper does this by mimicking the behavior of an IP Phone, in both Cisco and Avaya IP Phone environments. VoIP Hopper is a VLAN ...

Exploitation Packet Analysis Packet Crafting Voice Over IP


Snort

Snort is an open source network intrusion prevention and detection system utilizing a rule-driven language, which combines the benefits of signature, protocol and anomaly based inspection methods. With millions of downloads to date, Snort is the most widely deployed intrusion detection and prevention technology worldwide and has become the de ...

Intrusion Detection Packet Analysis


driftnet

Inspired by EtherPEG, Driftnet is a program which listens to network traffic and picks out images from TCP streams it observes. Fun to run on a host which sees lots of web traffic.

Network Monitoring Packet Analysis


WebScarab

WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, ...

Web Applications


BGPlay

BGPlay is a Java application which displays animated graphs of the routing activity of a certain prefix within a specified time interval. Its graphical nature makes it much easier to understand how BGP updates affect the routing of a specific prefix than by analyzing the updates themselves. The BGPlay database ...

Network Monitoring


VMware Workstation

VMware Workstation is a virtual machine software suite for x86 and x86-64 computers from VMware, previously a division of EMC Corporation. This software suite allows users to set up multiple x86 and x86-64 virtual computers and to use one or more of these virtual machines simultaneously with the hosting operating ...

Virtualization


netcat

Netcat is a featured networking utility which reads and writes data across network connections, using the TCP/IP protocol. It is designed to be a reliable "back-end" tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging ...

Network Utilities


Cacti

Cacti is a complete network graphing solution designed to harness the power of RRDTool's data storage and graphing functionality. Cacti provides a fast poller, advanced graph templating, multiple data acquisition methods, and user management features out of the box. All of this is wrapped in an intuitive, easy to use ...

Network Monitoring System Monitoring


Web Developer

Web Developer is a nifty Firefox extension which provides some very handy tools for web developers, including CSS manipulation, object highlighting, code validation, browser resizing, and lots more.

Browser Plugins


TrueCrypt

TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the ...

Encryption


arping

arping maps MAC addresses to IP addresses (or vice versa) by broadcasting ARP queries.

Enumeration Network Utilities


aircrack

aircrack is an 802.11 WEP and WPA-PSK key cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, thus making the attack much faster compared to other WEP cracking tools. In fact, aircrack is ...

Encryption Password Cracking Wireless


THC-Hydra

A very fast network logon cracker which support many different services. Currently this tool supports: TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, SMB, SMBNT, MS-SQL, MYSQL, REXEC, RSH, RLOGIN, CVS, SNMP, SMTP-AUTH, SOCKS5, VNC, POP3, IMAP, NNTP, PCNFS, ICQ, SAP/R3, LDAP2, LDAP3, Postgres, Teamspeak, Cisco auth, Cisco enable, LDAP2, Cisco AAA (incorporated ...

Password Cracking


nipper

Nipper processes network device configuration files, performs a security audit and outputs a security report with recommendations and a configuration report. Nipper supports a variety of devices from Cisco, Juniper, CheckPoint, Nortel and SonicWALL. Reports can be generated in HTML, XML, LaTeX, or plain text. Check out the online version ...

Vulnerability Scanning


Showing 46 - 60 of 97