background preloader

Home Page

PuTTY Download Page Home | FAQ | Feedback | Licence | Updates | Mirrors | Keys | Links | Team Download: Stable · Snapshot | Docs | Changes | Wishlist PuTTY is a free implementation of SSH and Telnet for Windows and Unix platforms, along with an xterm terminal emulator. It is written and maintained primarily by Simon Tatham. The latest version is 0.70. LEGAL WARNING: Use of PuTTY, PSCP, PSFTP and Plink is illegal in countries where encryption is outlawed. Use of the Telnet-only binary (PuTTYtel) is unrestricted by any cryptography laws. Latest news 2017-07-08 PuTTY 0.70 released, containing security and bug fixes PuTTY 0.70, released today, fixes further problems with Windows DLL hijacking, and also fixes a small number of bugs in 0.69, including broken printing support and Unicode keyboard input on Windows. 2017-04-29 PuTTY 0.69 released, containing security and bug fixes 2017-02-21 PuTTY 0.68 released, containing ECC, a 64-bit build, and security fixes 2017-01-21 Win64 builds and website redesign Site map

Netcat: the TCP/IP swiss army Ghostery Home Centreon StartCom Free SSL Certification Authority Tera Term Open Source Project pyrit - WPA/WPA2-PSK and a world of affordable many-core platforms Pyrit allows to create massive databases, pre-computing part of the IEEE 802.11 WPA/WPA2-PSK authentication phase in a space-time-tradeoff. Exploiting the computational power of Many-Core- and other platforms through ATI-Stream, Nvidia CUDA and OpenCL, it is currently by far the most powerful attack against one of the world's most used security-protocols. WPA/WPA2-PSK is a subset of IEEE 802.11 WPA/WPA2 that skips the complex task of key distribution and client authentication by assigning every participating party the same pre shared key. This master key is derived from a password which the administrating user has to pre-configure e.g. on his laptop and the Access Point. When the laptop creates a connection to the Access Point, a new session key is derived from the master key to encrypt and authenticate following traffic. The author does not encourage or support using Pyrit for the infringement of peoples' communication-privacy. Pyrit is free software - free as in freedom.

10 Essential Open Source Security Tools | HackerTarget.com There are thousands of open source security tools with both defensive and offensive security capabilities. The following are 10 essential security tools that will help you to secure your systems and networks. These open source security tools have been given the essential rating due to the fact that they are effective, well supported and easy to start getting value from. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Try our Hosted Vulnerability Scanners Open Source Tools you can Trust 7 day money back guarantee Get started in 3 minutes

Free Downloads Get started with our free security tools today, see where you are at risk. Security doesn't come easy, and it shouldn't be your wallet that decides over whether you can protect your data. That's why Rapid7 makes community editions of its security software available to download for free. In addition, we have some great free security tools you can use on your smart phone or in your browser. Check out the latest tools from Rapid7 Detect and investigate user-based attacks within your firewall, cloud services, and mobile environments Get Started Try our free RiskRater tool today and see where your organization's mobile, endpoint, and user based security stacks up to industry benchmarks. Get Started Other free tools from Rapid7 Free Download Nexpose Community Edition The free vulnerability scanner for small organizations or individual use Learn More Free Download Metasploit Community Edition Get your free download of the world's leading penetration testing tool Learn More Metasploit Pro Edition Free Download

WPA password recovery and audit tool. GPU accelerated. Examine Wireless Network Security Elcomsoft Wireless Security Auditor allows network administrators to verify how secure a company’s wireless network is by executing an audit of accessible wireless networks. Featuring patented cost-efficient GPU acceleration technologies, Elcomsoft Wireless Security Auditor attempts to recover the original WPA/WPA2-PSK text passwords in order to test how secure your wireless environment is. Features and Benefits Determine how secure your wireless network is Built-in wireless network sniffer (with AirPCap adapters) Test the strength of WPA/WPA2-PSK passwords protecting your wireless network Save time with patented GPU acceleration technology when one or more compatible NVIDIA or AMD video cards are present Hardware acceleration on Tableau TACC1441 hardware Run advanced dictionary attacks with highly configurable variations Perform attacks from inside or outside of your network How Secure Is Your Wireless Network? Wireless Network Security Audit Notes

How To - Remove threats - Free Removal Tools Tools and instructions for manually downloading definition database for F-Secure products for both Windows and Linux. Note: for more information on the latest database updates, check our DBTracker. Manual Update Using "Check Now": Windows Applies to: F-Secure Anti-Virus Client Security F-Secure Anti-Virus for Workstations F-Secure Protection Service for Business (PSB) Workstation Security F-Secure Anti-Virus 20xx F-Secure Internet Security 20xx How? Open the Anti-Virus user interface by double clicking the "F" icon on Windows task bar. Manual Update Using fsdbupdate: Windows F-Secure Anti-Virus products for Windows (version 9 and 10) PSB Workstation Security F-Secure Policy Manager (version 10) How? Download and execute the fsdbupdate utility fsdbupdate9.exe from our download server. Linux Applies to: F-Secure Internet Gatekeeper for Linux (version 4) F-Secure Policy Manager (version 9 and 10) Rescue CD Download and run the fsdbupdate9.run utility from our download server. Rescue CD Rescue CD

OWASP Download The OWASP Download category should be used to mark any page that has a significant download available. The download should be clearly marked and described near the top of the page. Our old download center is located at SourceForge. Many of our documents and tools are still available there. Important Note Many OWASP projects have not included the OWASP Download tag in their pages, so they are not listed here. How to add a new OWASP Download article You can follow the instructions to make a new OWASP Download article. [[Category:OWASP Download]] Subcategories This category has the following 63 subcategories, out of 63 total. Pages in category "OWASP Download" The following 68 pages are in this category, out of 68 total.

Burp Proxy Burp Proxy is an intercepting proxy server for security testing of web applications. It operates as a man-in-the-middle between your browser and the target application, allowing you to: Intercept and modify all HTTP/S traffic passing in both directions.Easily analyze all kinds of content, with automatic colorizing of request and response syntax, rendering of web content, and parsing of serialization schemes like AMF.Apply fine-grained rules to determine which requests and responses are intercepted for manual testing.View all traffic in the detailed Proxy history, with advanced filters and search functions.Send interesting items to other Burp Suite tools with a single click.Save all of your work, and resume working later.Quickly search and highlight interesting content within HTTP messages.Work with custom SSL certificates and non-proxy-aware clients.Define rules to automatically modify requests and responses without manual intervention. Screenshots - click to enlarge

Related:  Intrusion Detection system / Intrusion Protection systemRéseauxTechNet'Ethic - Propreté du net - Signaler - SécuritéSecurite