Your not logged in!


HomePortalCalendarFAQSearchMemberlistUsergroupsRegisterLog in
Top posters
Admin (66)
TeachMe (2)
EaTthEC00kie (1)
Hex_only (1)
tony220171 (1)
DJ107RX (1)
ace812 (1)
Cain532 (1)
derek878 (1)
Who is online?
In total there are 2 users online :: 0 Registered, 0 Hidden and 2 Guests


Most users ever online was 96 on Fri Jul 28, 2017 8:37 am
Latest topics

Share | 

 Great Networking, Security, informational, and organization software

Go down 

Posts : 66
L337 R4NK : 198
R3p : 0
Join date : 2013-09-21
Age : 29
Location :

PostSubject: Great Networking, Security, informational, and organization software   Sat Feb 15, 2014 9:52 pm

The Open Graph Viz Platform
Gephi is an interactive visualization and exploration platform for all kinds of networks and complex systems, dynamic and hierarchical graphs.
Runs on Windows, Linux and Mac OS X. Gephi is open-source and free.
For Windows:

Security & Networking:

Accidentally deleted an important file? Lost something important when your computer crashed? No problem! Recuva recovers files deleted from your Windows computer, Recycle Bin, digital camera card, or MP3 player. And it's free!

CCleaner is the number-one tool for cleaning your Windows PC. It protects your privacy online and makes your computer faster and more secure. Easy to use and a small, fast download.

Eraser is a secure data removal tool for Windows. It completely removes sensitive data from your hard drive by overwriting it several times with carefully selected patterns.

Malwarebytes Anti-Malware:

Advanced System Care:

Snort for Windows:
SNORT® is an open source network intrusion prevention system capable of performing real-time traffic analysis and packet logging on IP networks. Snort can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Snort is comprised of two major components: (i) a detection engine that utilizes a modular plug-in architecture (the “Snort Engine”) and (ii) a flexible rule language to describe traffic to be collected (the “Snort Rules”).

The network, server and virtualization monitoring software

Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic.
Kismet identifies networks by passively collecting packets and detecting standard named networks, detecting (and given time, de-cloaking) hidden networks, and inferring the presence of non-beaconing networks via data traffic.

Foundstone Filewatch:
RootKit (RAT: Remote Administration Tool) Remover:
McAfee Rootkit Remover is a stand-alone utility used to detect and remove complex rootkits and associated malware. Currently it can detect and remove ZeroAccess, Necurs and TDSS family of rootkits. McAfee Labs plans to add coverage for more rootkit families in future versions of the tool.

McAfee GetSusp is intended for users who suspect undetected malware on their computer. GetSusp eliminates the need for deep technical knowledge of computer systems to isolate undetected malware. It does this by using a combination of heuristics and querying the McAfee Global Threat Intelligence (GTI) File Reputation database to gather suspicious files.

McAfee Stinger is a standalone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but a specialized tool to assist administrators and users when dealing with infected system. Stinger utilizes next-generation scan technology, including rootkit scanning, and scan performance optimizations. It detects and removes threats identified under the "Threat List" option under Advanced menu options in the Stinger application.

Finds Ascii, Unicode and Resource strings in a file.
A small, very fast and powerful text extractor that will be of particular interest to programmers. It can extract text from any kind of file and includes the ability to find plain ASCII text, Unicode (double byte ANSI) text and Resource strings, providing useful information for each item in the optional "advanced" view mode. Its comprehensive filtering helps prevent unwanted text being listed. The gathered list can be searched and saved to a separate file as either a plain text file or in informative tabular format.

Useful tip: Place a shortcut to Bintext in your Windows\SendTo folder so that you can automatically send files to BinText by right-clicking on their names and choosing Send To -> BinText from the drop-down menu. You can set this up by right-clicking on bintext.exe, selecting Copy then open up your Windows\SendTo folder, right click the mouse and select Paste Shortcut.

Dump Firefox AutoComplete files into XML
GPL Version 2

This application will search for the default Firefox profile of the user who runs the tool and dump the AutoComplete cache in XML format to standard output. Alternatively, autocomplete files can be passed to the application and they will be parsed as well. This application understands mork based autocomplete files (Firefox 1.x) as well as SQLite based formhistory and webappsstore files (Firefox 2.x).

The download package contains a standalone windows application. The MSVCR71.dll maybe needed on systems that do not already have this file. The full Python source code is also included and can be run on Windows, Mac OS X, Linux, or any other system with Python installed (the additional "pysqlite2" modulal is required for SQLite based file parsing).

Foundstone Vision:
Reports all open TCP and UDP ports and maps them to the owning process or application.

Vision, a host based Forensic Utility is the GUI successor to the well-known freeware tool, Fport. This innovative new product from Foundstone shows all of the open TCP and UDP ports on a machine, displays the service that is active on each port, and maps the ports to their respective applications. Vision allows users to access a large amount of supplementary information that is useful for determining host status by displaying detailed system information, applications running, as well as processes and ports in use.

Show information about Windows. Reveal passwords etc.

ShoWin displays useful information about windows by dragging a cursor over them.

Perhaps one of the most popular uses of this program is to display hidden password editbox fields (text behind the asterisks *****). This will work in many programs although Microsoft have changed the way things work in some of their applications, most notably MS Office products and Windows 2000. ShoWin will not work in these cases. Neither will it work for password entry boxes on web pages, at least with most web browsers.

Additional features include the ability to enable windows that have been disabled, unhide hidden windows (try the program with the include invisibles option set and see how many windows you have on your desktop that you didn't know about!) and force windows to stay on top or be placed below others.

Cisco IOS IPv4 Remote Denial of Service Vulnerability Detection Utility

CIScan is a Windows based SNMP detection and analysis utility that can quickly and accurately identify Cisco devices with SNMP enabled in an enterprise environment. This utility can effectively indicate devices that are potentially vulnerable to the Cisco IPv4 Remote Denial of Service vulnerability from July 17, 2003.

CIScan is intended for use by system and network administrators as a fast and reliable utility for identifying potentially at risk Cisco devices in a passive manner. This tool may be run in production environments during production hours.

We have discovered that one of the exploits of the Aurora vulnerability is exfiltration of intellectual property via source code management tools like Perforce. McAfee CSniffer is a free tool which will scan your infrastructure to discover if you have unencrypted Perforce passwords which could be stolen and used to penetrate your source code library. Download now.

This tool acts much like a standard Ethernet network sniffer. However, unlike a traditional packet sniffer it doesn't attempt to capture and decode all traffic but instead is geared toward discovering useful infrastructure and security-related data from the network, often from traffic not sent to or from the host system i.e. general broadcast network traffic. This data can reveal all manner of useful information, ranging from live systems on the network, hostnames, IPv6 systems, routers and name servers, user names and passwords.

A network admin utility for remotely detecting the most common DDoS programs.

DDoSPing is a remote scanner for the most common Distributed Denial of Service programs (often called Zombies by the press). These were the programs responsible for the recent rash of attacks on high profile web sites.

This tool will detect Trinoo, Stacheldraht and Tribe Flood Network programs running with their default settings, although setup of each program type is possible from the configuration screen. Scanning is performed by sending the appropriate UDP and ICMP messages at a controlable rate to a user defined range of addresses.

DIRE (Detecting Insecurely Registered Executables)

The ability to register applications that can then be automatically initiated by Windows is a powerful feature today that enhances the end user’s experience and furthermore enables system administrators to exert complete control over the machines in their environment. However, attackers can target these same systems by exploiting ‘insecurely registered applications’ on target systems. Foundstone has released a free tool called Foundstone DIRE, which allows users/system administrators to identify “insecurely registered applications” on their systems.

Capsa is a portable network analyzer application for both LANs and WLANs which performs real-time packet capturing capability, 24x7 network monitoring, advanced protocol analysis, in-depth packet decoding, and automatic expert diagnosis. Capsa gives you a comprehensive and high-level window to your entire network, helps network administrators or network engineers quickly pinpoint and resolve application problems, Capsa has the most user friendly user interface and post powerful data packet capture and analysis engine in the industry.

SiteDigger 3.0 searches Google’s cache to look for vulnerabilities, errors, configuration issues, proprietary information, and interesting security nuggets on web sites.

Socket Security Auditor:
Application developers need to be aware that attackers can target these same client-server applications by "hijacking" the server socket. Insecurely bound server sockets allow an attacker to bind his / her own socket on the same port, gaining control of the client connections and ultimately allowing the attacker to successfully steal sensitive application user information as well as launch denial of service attacks against the application server.

Traceroute and Whois program.

A visual (i.e. GUI as opposed to command-line) traceroute and Whois program. Pinging can be set at a controllable rate as can the frequency of repeatedly scanning the selected host. The built-in simple Whois lookup can be used to identify hosts discovered along the route to the destination computer. Parallel pinging and hostname lookup techniques make this traceroute program perhaps the fastest currently available.

SuperScan is a powerful connect-based TCP port scanner, pinger and hostname resolver. Multithreaded and asynchronous techniques make this program extremely fast and versatile.

Key Features
Perform ping scans and port scans using any IP range.
Use a text file to extract addresses from.
Scan any port range from a built-in list or any given range.
View responses from connected hosts.
Modify the port list and port descriptions using the built in editor.
Merge port lists to build new ones.
Connect to any discovered open port using user-specified "helper" applications.
Assign a custom helper application to any port.
Save the scan list to a text file.
Transmission speed control.
User friendly interface.
Comprehensive help file.

A TCP/UDP port listener.

Attacker -A TCP/UDP port listener. You provide a list of ports to listen on and the program will notify you when a connection or data arrives at the port(s). Can minimize to the system tray and play an audible alert. This program is intended to act as a guard dog to notify you of attempted probes to your computer via the Internet.

Attacker is not intended to protect your computer from hackers in any way other than notifying you of what was always happening to your computer before you knew about it! Running this program may in fact attract more attention to your computer from people remotely scanning for vulnerabilities due to it appearing as a collection of open ports. However, it will definitely not lessen the security of your computer. It is strongly recommended you have a good anti-virus program installed and that you do NOT have File & Printer Sharing enabled for use over the Internet.

Identify unknown open ports and their associated applications

fport supports Windows NT4, Windows 2000 and Windows XP

fport reports all open TCP/IP and UDP ports and maps them to the owning application. This is the same information you would see using the 'netstat -an' command, but it also maps those ports to running processes with the PID, process name and path. Fport can be used to quickly identify unknown open ports and their associated applications.

FPort v2.0 - TCP/IP Process to Port Mapper

Pid Process Port Proto Path
392 svchost -> 135 TCP C:\WINNT\system32\svchost.exe
8 System -> 139 TCP
8 System -> 445 TCP
508 MSTask -> 1025 TCP C:\WINNT\system32\MSTask.exe
392 svchost -> 135 UDP C:\WINNT\system32\svchost.exe
8 System -> 137 UDP
8 System -> 138 UDP
8 System -> 445 UDP
224 lsass -> 500 UDP C:\WINNT\system32\lsass.exe
212 services -> 1026 UDP C:\WINNT\system32\services.exe

The program contains five (5) switches. The switches may be utilized using either a '/'
or a '-' preceding the switch. The switches are;

/? usage help
/p sort by port
/a sort by application
/i sort by pid
/ap sort by application path

Software Security:

.NET Security Toolkit:
The McAfee Foundstone SASS (Software Application Security Services) .NET Security Toolkit is designed to help application developers and architects to build secure and reliable .NET software applications. The new toolkit is comprised of the Validator.NET, .NETMon and SecureUML template tools which help developers validate, debug and analyze vulnerabilities during the design and development of .NET applications.

McAfee Foundstone CodeScout™ is a free tool developed by McAfee Foundstone to help application developers and code reviewers validate adherence to coding best practices and determine the complexity and scope of a code base. The tool is a plugin that comes with a set of default rules as well as functionality allowing power users to define their own rules. This tool helps users automate part of the code review process by identifying potential hot-spots in the code base and provides useful metrics about to size and scope of the source code of a project.

A file change monitor. Used with BlackICE Defender.

FileWatch (originally called ICEWatch 1.x) is a small utility that can monitor a given file for changes. Monitoring can detect file size changes or simply file writes, both with minimal impact on system resources (no polling is performed). The primary use of this utility is for monitoring changes in the log file of a personal firewall program and being able to spawn a separate application when changes are detected, but the tool can be applied to any number of other uses.

McAfee FileInsight:
McAfee FileInsight, developed by McAfee Labs, is an integrated tool environment for website and file analysis. Its many built-in editing and analysis features can be easily extended through simple Python-based plugins.

HDD Security:

ReadT80.BAT is a self-contained DEBUG script that will create a file consisting of 36 sectors that are read from tracks 80 and 81 of a BOOT sector infected 1.44M diskette.

RWFloppy restores or creates, image files to or from a floppy diskette. Its primary use is to allow transporting diskette images over the network.

Be aware, that DOS does not allow programs to reach outside the 'acceptable' bounds of a diskette (i.e. Track 80 & 81 of a 1.44M diskette), - and this is where many bootsector viruses 'hide' the bulk of their code.

SaveInfo is a utility to capture possible boot sector viruses. This tool saves the MBR, the first two tracks of your hard disk, as well as the last track of each partition and and the last track of the physical drive.

You should run this from a bootable diskette from your A: drive.

SaveInfo [filename] Options

(default value A:\saveinfo.sav)

-i Print disk information
 -s Save Partition in a file
 -r Restore partition from a file
 -h Help

Saveinfo -s
   Saveinfo -r -i

Other Network Management and monitoring Software:
Nagios - Network monitoring
OpenNMS - Network management
JFFNMS - Network management
BigBrother - Systems management
BigSister - Systems management
GeneSyS - Network and systems management
NetDisco - Network management
REMSTATS - Network monitoring software
Sysmon - Network monitoring software
Cricket -– Router monitoring

Cacti - rrdtool-based graphing solution
MRTG - Traffic monitoring
Ntop - Traffic monitoring
Nessus -– Remote security scanning
PIKT -– Systems monitoring and configuring
RRDTool –- Analytical graphing
Webmin -– Unix system admin
Cacti -– Network and systems performance graphing
CFEengine -– Network configuration
Kismet -Wireless scanning
NeDi - Network discovery
Nmap - Network discovery
Syslog NG –- Log file analysis, consolidation, and filtering

[Antivirus Removal/Malware Removal/PC Cleanup]
- ComboFix
- rkill
- SUPERAntiSpyware
Back to top Go down
View user profile
Great Networking, Security, informational, and organization software
Back to top 
Page 1 of 1
 Similar topics
» A great day with friends
» Android Free Chess Software
» I'm looking for a big board software (16x16) ?
» Software for solving chess problems / puzzles / endgame studies List
» Free Mobile Chess Software

Permissions in this forum:You cannot reply to topics in this forum
BaSsHaXoR :: Security-
Jump to: