Virtual Hacking Lab - Download

Virtual Hacking Lab A mirror of deliberately insecure applications and old softwares with known vulnerabilities. Used for proof-of-concept /security training/learning purposes. Available in either virtual images or live iso or standalone formats. Download Download Saba ...

NetSetMan

NetSetMan NetSetMan is a network settings manager that helps you switch between 6 different, visually structured profiles that includes IP address, subnet mask, default gateway, preferred/alternate DNS server, computer name, workgroup, DNS domain, WINS server, default printer and run scripts. Although mostly for mobile users...

Awesome Duplicate Photo Finderv1.1

Awesome Duplicate Photo Finderv1.1 Awesome Duplicate Photo Finder is a powerful tool that helps you to find and remove duplicate photos or similar pictures on your PC. It is able to compare pictures that were resized or with corrected colors (e.g. contrast modified, black and white photos, etc.) Downloa...

DataRecoveryv2.4.7UPDATED

DataRecoveryv2.4.7 UPDATED DataRecovery recovers deleted files even if they have been purged from the recycle bin. You can also search for deleted files by partial string in the filename. There is a feature to wipe out deleted files. It supports FAT12, FAT16, FAT32, NTFS, EFS filesystems. Download -Sab...

HOWTO : SQLi Lab Series

HOWTO : SQLi Lab Series The following is the SQLi Lab, which is created by Audi-1 who is an Offensive Security Certified Expert (OSCE). He explains how SQLi works. SQLi Lab Series - Introduction SQLi Lab Series - Error Based SQLi Lab Series - Double Query / SubQuery SQLi Lab Series - Blind Injection - Boolean Based SQLi Lab Series - Blind Injection - Time Based SQLi Lab Series...

Top 5 sites to create Resume Online

Top 5 sites to create Resume Online http://www.myresumeonline.org/start/ http://cvmkr.com/ http://resumizer.com/free_resume_creator.htm http://www.jobspice.com/home http://resumecompanion.com/ _Sab...

Cross Site Scripting

Cross Site Scripting Sildes http://www.slideshare.net/null0x00/cross-site-scripting ...

Anonymous-DoS

Anonymous-DoS  protonanon an anonymous dedicated http flood program Description What is Anonymous-DoS?Anonymous-DoS is a http flood program written in hta and javascript, designedto be lightweight, portable, possible to be uploaded to websites whilst stillhaving a client version, and made for Anonymous ddos attacks.How does it work?It will flood a chosen web server with HTTP...

Java LOIC Beta

Java LOIC  Beta  acruxaldebaran Network stress testing application. Description JavaLOIC is a clone of LOIC written entirely in java. This project is not related with Praetox. Source & Download ...

XOIC is a tool to make (D)DoS attacks.

XOIC  david9904 XOIC is a tool to make (D)DoS attacks. Description XOIC is a tool to make DoS attacks.More information about DoS attacks: http://de.wikipedia.org/wiki/Denial_of_Service.The tool makes a (D)DoS attacks to any IP address,with a user selected port and a user selected protocol.XOIC is in my tests a little...

jsql-injection

jsql-injection jSQL Injection is a java tool for automatic database injection. An easy to use SQL injection tool for retrieving database informations from a distant server. You can discuss about jSQL Injection on the discussion group. jSQL Injection features: GET, POST, header, cookie methods normal, error based,...

LastActivityView is a tool for Windows

LastActivityView is a tool for Windows operating system that collects information from various sources on a running system, and displays a log of actions made by the user and events occurred on this computer. Source and Downloa...

The Biggest Problem in Computer Security

The Biggest Problem in Computer Security People tend to focus on various areas as being important for computer security such as memory corruption vulnerabilities, malware, anomaly detection, etc. However the lurking and most critical issue in my opinion is staffing. The truth is, there is no pool of candidates out there to draw from at a certain level in computer security. As an...

How to Prevent Security Breaches from Known Vulnerabilities

How to Prevent Security Breaches from Known Vulnerabilities While it's bad to be targeted by a hacker using new and relatively unknown security vulnerabilities, it's awful to fall victim to well-known attacks. Read More  Source and credi...

I2P ANONYMOUS NETWORK

I2P ANONYMOUS NETWORK I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. Many applications are available that interface with I2P,...

The Chakra Project !

The Chakra Project ! Chakra GNU/LInux is a free, user-friendly and extremely powerful liveCD and distribution using the award winning KDE SC and Plasma Desktop with a bundle system to use GTK-apps. Source and Downloa...

ESSPEE - Penetration Testing & Forensics

ESSPEE - Penetration Testing & Forensics ESSPEE is a derivetive of Back | Track 5, based on Ubuntu 12.04. Designed for users who wish to use only free software. It is packed with featured security tools with stable configurations. This version consolidates the Unity desktop interface; a brand new way to find and manage your applications.Thanks...

Open Source Next Generation Intrusion Detection and Prevention Engine

Suricata Downloads The Suricata Engine is an Open Source Next Generation Intrusion Detection and Prevention Engine. This engine is not intended to just replace or emulate the existing tools in the industry, but will bring new ideas and technologies to the field. OISF is part of and funded by the Department...