View and manage processes, services and more with this powerful tool.
Process Hacker is a free and open source process viewer. This multi-purpose tool will assist you with debugging, malware detection and system monitoring.
PAC is a Perl/GTK replacement for SecureCRT/Putty/etc (linux ssh/telnet/... gui)... It provides a GUI to configure connections: users, passwords, EXPECT regular expressions, macros, etc. You like 'SecureCRT/SSHMenu'? Check this tool and let me know
A security tool to remove sensitive data from your Windows hard drive
Eraser is a secure data removal tool for Windows. It completely removes sensitive data from your hard drive by overwriting it several times with carefully selected patterns.
An open-source x64/x32 debugger for windows.
An open-source x64/x32 debugger for windows. Development is done on GitHub (https://github.com/x64dbg/x64dbg). Daily snapshots are uploaded here, snapshots for every commit can be found on http://releases.x64dbg.com
simple and light-weight archive password cracker
Cracx allows you to crack archive passwords of any encryption using 7-zip, WinRAR or a custom command, via Brute Force or Dictionary attack. Note: You must NOT use this program with files you don't have the rights to extract/open/use them! Currently, the program requires a current version of either 7-zip or WinRAR to be installed, but you can also use it to bruteforce basically anything that is executably via command-line with custom parameters. On an i7 CPU, it runs approximately 30 combination tests per second. Feel free to make suggestions or contribute by implementing features and translating the tool into your native language!
deletes junk files to free disk space and improve privacy
BleachBit frees disk space and maintains privacy. Cleans cache, Internet history, temporary files, logs, cookies, Firefox, Google Chrome, Flash, Windows, Linux, and more. Downloads are at www.bleachbit.org and source code is at GitHub.
NOTE PROJECT MIGRATED TO GITHUB - https://github.com/samrocketman/ekeyfinder is a Magical Jelly Bean Keyfinder fork. It is a utility that retrieves the product key used to install Windows from your registry or from an unbootable Windows installation. It works on Windows 9X, ME, NT/2K/XP, and Vista/Win7 and for other software.
Cyberoam iView; the Intelligent Logging & Reporting solution provides organizations network visibility across multiple devices to achieve higher levels of security, data confidentiality while meeting the requirements of regulatory compliance. To know more about Cyberoam and it’s security solutions visit us at www.cyberoam.com.
edit and replay captured network traffic
tcpreplay is a suite of tools to edit and replay captured network traffic.
iOS firmware tools
When you update your iDevice, iTunes downloads a firmware file. If you open up the firmware, you will find many small files along with one big one. That big one is the (encrypted) filesystem (i.e. the one that is installed on the device). If you use iDecryptIt on the file, iDecryptIt will decrypt it. The decrypted file can then be extracted with (the included) 7-Zip or mounted as a virtual hard drive with certain tools. ** Please do not contact me asking for keys. The keys provided by iDecryptIt are NOT my own work, but the contributors to The iPhone Wiki. ** Support for the other files contained in the firmware is coming.
Yet Another Process Monitor (YAPM) is a powerful process viewer for Windows that monitors the services & processes, their modules, threads, handles, windows, TCP/UDP connections... etc. running on local system or on any of the computers on your network.
CloseTheDoor indentifies all the listening ports TCP/UDP over IPv4/v6 and the associated program files. This will help you to detect security holes and close backdoors when you want to prevent remote attacks.
UFONet - (DDoS botnet + DoS tool) via Web Abuse
UFONet - is a tool designed to launch Layer 7 (HTTP/Web Abuse) DDoS & DoS attacks. + FAQ: https://ufonet.03c8.net/FAQ.html -> UFONet-v1.0 "TachY0n!" (.zip) -> md5 = a928524c167238d6a95a8a38ada5c334 --------------------------------------------
Quickly recover problems that was created by viruses/malwares: Registry editor has been disable, task manager has been disable. also, contains sort of 'task-manager-replacement'. The name is a bit pretentious, but I couldn't think of any better name :-)
Polish version of Kali LINUX
Polish version of Kali LINUX pentesting linux distro
Plugin adding TOTP to KeePass2 tray menu, entry list and auto-type.
Time based One Time Password Plugin to enable 2 step authentification (supports Google and Dropbox) by generating TOTPs from the KeePass tray icon. This plugin also provides a custom column to display and/or generate TOTP's. Auto-Type is also supported when the specified custom field is used in a keystroke sequence. This plugin requires KeePass 2.21 as it uses features that are not available in earlier versions.
Note: WE ARE UNABLE TO UPDATE THE SCANNER AT THIS MOMENT! Note: WE APPRECIATE YOUR CONTRIBUTION. Detects file inclusion, sql injection, command execution vulnerabilities of a target Joomla! web site. We'll update it soon. The database update is currently maintained by web-center.si. Send your contributions, recommendations and bugs report to joomscan at yehg.net or creating a ticket at Trac here.
Stealth has moved to GitHub, and can now be reached at https://fbb-git.github.io/stealth/ Please refer to github's location for the latest archive and releases.
Adobe Flash SWF file reader, editor
Adobe Flash SWF editor which can read and edit bytecode.
Free-SA is report generating tool for web, proxy and mail log files
Free-SA is logs processor and report generating tool. It can be used to control traffic usage, to evaluate conformance to the Internet access security policies, to investigate security incidents, to evaluate web server efficiency and to detect troubles with server configuration.
Prevent and Protect Your HTML5 Video, Music , Audio From Download Free
Defa Protector is A Simple PHP and Wordpress Plugin To Protect and Prevent Video Save As From Browser and Some Video Grabber. There is 100% Guaranteed Protection and There might be some tradeoff but If you care about Digital Rights Management of Your Video and Music Content. This Project is for you. Defa Protector 6.7.1 Revamp Code For Better Performance To The Bone. We almost rewritten this project from scratch.
Hyenae is a highly flexible platform independent network packet generator. It allows you to reproduce several MITM, DoS and DDoS attack scenarios, comes with a clusterable remote daemon and an interactive attack assistant. Hyenae will be continued here: https://sourceforge.net/projects/jhyenae/
cross-platform, encryption application
encrypt is a multi-platform, file encryption application. Binary packages are currently provided for Arch, Debian, Fedora, MS Windows, Android and OS X. For further details, including the latest source code, visit https://albinoloverats.net/projects/encrypt
check if your vpn is falling down
This tool check every x seconds your public ip adress, if it changes (vpn fall down for example) it stops one or several programs. When the VPN crash this tool can send a mail, play a sound. - This tool work on Windows and Linux. - You need to install JAVA 1,8 on your operating system - Download checkvpn.zip and unzip it - Double click on checkvpn.jar - Click on the button « Update ip » when the VPN is stopped to get your public ip address. - Type the programs separated by semicolon that you would like to stop when the vpn is falling down (ex: utorrent.exe;firefox.exe on linux just put « firefox » no extension) - Click on start button and the program will check every x seconds your ip address, if it not the vpn's ip the programs will be stopped by this tool. - The option « auto start » start the process automaticaly. - The ip adress is geolocalized via MaxMind the web site http://check.vpn.free.fr
An encryption tool for creating file archives
CrococryptFile is a file encryption tool which creates encrypted archives of arbitrary files and folders. The encryption features of CrococryptFile can be compared to a ZIP utility that uses ZIP's AES encryption. However, there are significant differences. CrococryptFile... - encrypts all file and folder information including filenames, time/date and filesize information, - disguises any information of the archive's content, because all data and meta-data is simply integrated into a giant file dump. =Crypto Suites= For a full list of and details about supported crypto suites, please visit the CrococryptFile Homepage. Examples: - Password-based encryption (following PBKDF2) with AES-256, Twofish, Serpent, ... - Public key encryption using GPG/OpenPGP, Windows Keystore/CAPI with RSA/X.509 certificates - Cloaked (headerless) Password-based Encryption (AES-Twofish-256 cascaded) - ...