Virtual Hacking Lab - Download

Virtual Hacking Lab A mirror of deliberately insecure applications and old softwares with known vulnerabilities. Used for proof-of-concept /security training/learning purposes. Available in either virtual images or live iso or standalone formats. Download Download Saba ...

NetSetMan

NetSetMan NetSetMan is a network settings manager that helps you switch between 6 different, visually structured profiles that includes IP address, subnet mask, default gateway, preferred/alternate DNS server, computer name, workgroup, DNS domain, WINS server, default printer and run scripts. Although mostly for mobile users...

Awesome Duplicate Photo Finderv1.1

Awesome Duplicate Photo Finderv1.1 Awesome Duplicate Photo Finder is a powerful tool that helps you to find and remove duplicate photos or similar pictures on your PC. It is able to compare pictures that were resized or with corrected colors (e.g. contrast modified, black and white photos, etc.) Downloa...

DataRecoveryv2.4.7UPDATED

DataRecoveryv2.4.7 UPDATED DataRecovery recovers deleted files even if they have been purged from the recycle bin. You can also search for deleted files by partial string in the filename. There is a feature to wipe out deleted files. It supports FAT12, FAT16, FAT32, NTFS, EFS filesystems. Download -Sab...

HOWTO : SQLi Lab Series

HOWTO : SQLi Lab Series The following is the SQLi Lab, which is created by Audi-1 who is an Offensive Security Certified Expert (OSCE). He explains how SQLi works. SQLi Lab Series - Introduction SQLi Lab Series - Error Based SQLi Lab Series - Double Query / SubQuery SQLi Lab Series - Blind Injection - Boolean Based SQLi Lab Series - Blind Injection - Time Based SQLi Lab Series...

Top 5 sites to create Resume Online

Top 5 sites to create Resume Online http://www.myresumeonline.org/start/ http://cvmkr.com/ http://resumizer.com/free_resume_creator.htm http://www.jobspice.com/home http://resumecompanion.com/ _Sab...

Cross Site Scripting

Cross Site Scripting Sildes http://www.slideshare.net/null0x00/cross-site-scripting ...

Anonymous-DoS

Anonymous-DoS  protonanon an anonymous dedicated http flood program Description What is Anonymous-DoS?Anonymous-DoS is a http flood program written in hta and javascript, designedto be lightweight, portable, possible to be uploaded to websites whilst stillhaving a client version, and made for Anonymous ddos attacks.How does it work?It will flood a chosen web server with HTTP...

Java LOIC Beta

Java LOIC  Beta  acruxaldebaran Network stress testing application. Description JavaLOIC is a clone of LOIC written entirely in java. This project is not related with Praetox. Source & Download ...

XOIC is a tool to make (D)DoS attacks.

XOIC  david9904 XOIC is a tool to make (D)DoS attacks. Description XOIC is a tool to make DoS attacks.More information about DoS attacks: http://de.wikipedia.org/wiki/Denial_of_Service.The tool makes a (D)DoS attacks to any IP address,with a user selected port and a user selected protocol.XOIC is in my tests a little...

jsql-injection

jsql-injection jSQL Injection is a java tool for automatic database injection. An easy to use SQL injection tool for retrieving database informations from a distant server. You can discuss about jSQL Injection on the discussion group. jSQL Injection features: GET, POST, header, cookie methods normal, error based,...

LastActivityView is a tool for Windows

LastActivityView is a tool for Windows operating system that collects information from various sources on a running system, and displays a log of actions made by the user and events occurred on this computer. Source and Downloa...

The Biggest Problem in Computer Security

The Biggest Problem in Computer Security People tend to focus on various areas as being important for computer security such as memory corruption vulnerabilities, malware, anomaly detection, etc. However the lurking and most critical issue in my opinion is staffing. The truth is, there is no pool of candidates out there to draw from at a certain level in computer security. As an...

How to Prevent Security Breaches from Known Vulnerabilities

How to Prevent Security Breaches from Known Vulnerabilities While it's bad to be targeted by a hacker using new and relatively unknown security vulnerabilities, it's awful to fall victim to well-known attacks. Read More  Source and credi...

I2P ANONYMOUS NETWORK

I2P ANONYMOUS NETWORK I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. Many applications are available that interface with I2P,...

The Chakra Project !

The Chakra Project ! Chakra GNU/LInux is a free, user-friendly and extremely powerful liveCD and distribution using the award winning KDE SC and Plasma Desktop with a bundle system to use GTK-apps. Source and Downloa...

ESSPEE - Penetration Testing & Forensics

ESSPEE - Penetration Testing & Forensics ESSPEE is a derivetive of Back | Track 5, based on Ubuntu 12.04. Designed for users who wish to use only free software. It is packed with featured security tools with stable configurations. This version consolidates the Unity desktop interface; a brand new way to find and manage your applications.Thanks...

Open Source Next Generation Intrusion Detection and Prevention Engine

Suricata Downloads The Suricata Engine is an Open Source Next Generation Intrusion Detection and Prevention Engine. This engine is not intended to just replace or emulate the existing tools in the industry, but will bring new ideas and technologies to the field. OISF is part of and funded by the Department...

CAINE (Computer Aided INvestigative Environment)

CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a project of Digital ForensicsCurrently the project manager is Nanni Bassetti.CAINE offers a complete forensic environment that is organized to integrate existing software tools as software modules and to provide a...

Cortana Scripts for Armitage

Cortana Scripts This repository is a collection of Cortana scripts available for your use. Cortana is a scripting language for Armitage and Cobalt Strike. Click the Downloads link (top right) and download a ZIP or TGZ file with all of the files in this repository. Load what you like. Tutorial If you'd like to write your own Cortana scripts, take a look at...

Top 125 Network Security Tools

Top 125 Network Security Tools We're very impressed by the collective smarts of the security community and we highly recommend reading the whole list and investigating any tools you are unfamiliar with. Click any tool name for more details on that particular application, including the chance to read (and write) reviews. Many site...

Document Hub

Document Hub. interesting site. http://dochub.i...

Ixquick Protects Your Privacy!

Ixquick Protects Your Privacy! The only search engine that does not record your IP address. https://ixquick.com/eng/? https://ixquick.com/eng/protect-privacy.html Your privacy is under attack! Every time you use a regular search engine, your search data is recorded. Major search engines capture your IP...

Send Private Info That Self-Destructs

Send Private Info That Self-Destructs Sending confidential information such as passwords, account information and other sensitive data in emails and IM is not necessarily safe. That data is typically stored with remnants of the bits in places you don't need it to be. https://oneshar.es/ _Sab...

Upload your files anonymously and free on AnonFiles.com

Upload your files anonymously and free on AnonFiles.com. https://anonfiles.com/ Upload your files anonymously and free on AnonFiles.com. We offer you hotlinking, 500 MB filesize limit and unlimited bandwidth. AnonFiles.com is your number one Anonymous File Upload site. -Sab...

ESSPEE - Penetration Testing & Forensics

ESSPEE - Penetration Testing & Forensics ESSPEE is a derivetive of Back | Track 5, based on Ubuntu 12.04. Designed for users who wish to use only free software. It is packed with featured security tools with stable configurations. This version consolidates the Unity desktop interface; a brand new way to find and manage your applications.Thanks...

Subterfuge Project -Automated Man-in-the-Middle Attack Framework

subterfuge Automated Man-in-the-Middle Attack Framework Source and Credit How to video (Youtbe) subterfuge Automated Man-in-the-Middle Attack Framework Project HomeDownloadsWikiIssuesSource Search    Search within:     All wiki pages   Featured pages ...