Section: .. / Win /
|
Windows tools - This directory contains hundreds of assorted Windows security tools. Try them out first on a test machine first unless you are sure you know what you are doing.
|
| /// File Name: |
32pexe20.zip |
Description:
|
PrivateEXE. Add password protection to NT EXE files.
| | File Size: | 151806 | | Last Modified: | Aug 16 20:04:22 1999 |
| MD5 Checksum: | 64d4f08e8e46e3f8269b46f12908d763 |
|
| /// File Name: |
aat4xx.zip |
Description:
|
G-Lock Software Advanced Administrative Tools v4.3 is a multithreaded network diagnostic tool which combines 9 tools into one. Its purpose is to accumulate data pertaining to network status and availability, using all of the latest development tools in network research. Includes a port scanner, cgi scanner, proxy analyzer, netstat, process info, and more. 30 day shareware trial. Tested on Win 95/98/NT/2000. Screenshot available here.
| | Author: | G-Lock Software | | Homepage: | http://www.glocksoft.com | | Changes: | Added registry cleaner and some new things. | | File Size: | 1412007 | | Last Modified: | Feb 2 14:05:52 2001 |
| MD5 Checksum: | 05d864224d22d4048b078a568c8c4f34 |
|
| /// File Name: |
accp.exe |
Description:
|
Accp.exe recovers lost passwords on MS Access 97 mdb files. Ported from Java.
| | Author: | Haris Bjelak | | File Size: | 171451 | | Last Modified: | Jan 12 19:42:50 2001 |
| MD5 Checksum: | aa40aee2369d860225a440c113052fd5 |
|
| /// File Name: |
achilles-0-27.zip |
Description:
|
Achilles is a tool for Windows designed for testing the security of web applications. Achilles is a proxy server, which acts as a man-in-the-middle during an HTTP session. A typical HTTP proxy will relay packets to and from a client browser and a web server. Achilles will intercept an HTTP session?s data in either direction and give the user the ability to alter the data before transmission. For example, during a normal HTTP SSL connection a typical proxy will relay the session between the server and the client and allow the two end nodes to negotiate SSL. In contrast, when in intercept mode, Achilles will pretend to be the server and negotiate two SSL sessions, one with the client browser and another with the web server. As data is transmitted between the two nodes, Achilles decrypts the data and gives the user the ability to alter and/or log the data in clear text before transmission.
| | Homepage: | http://www.digizen-security.com/projects.html | | File Size: | 433167 | | Last Modified: | Aug 16 01:06:47 2001 |
| MD5 Checksum: | 53c77733109f3d7b33a5143703e8cf05 |
|
| /// File Name: |
ackcmd.zip |
Description:
|
AckCmd is a special kind of remote Command Prompt for Windows 2000. It communicates using only TCP ACK segments. This way the client component is able to directly contact the server component through a firewall in some cases. More information can be found in the AckCmd FAQ and in the ACK Tunneling Trojans paper.
| | Author: | Arne Vidstrom | | Homepage: | http://www.ntsecurity.nu/toolbox/ackcmd | | File Size: | 24498 | | Last Modified: | Aug 15 02:30:08 2000 |
| MD5 Checksum: | 3bbbc2ffe5b7a002556c3f97a35bf45a |
|
| /// File Name: |
Adig02f.zip |
Description:
|
Advanced DIG is a TCP-based DNS client for Windows that supports most of the available options, including AXFR zone transfer. It features an extended mode which utilizes a TCP connection to acquire any info that can be supplied by server and supports 20 different queries to nameserver.
| | Author: | Averk | | Homepage: | http://nscan.hypermart.net | | File Size: | 84770 | | Last Modified: | Jul 12 13:22:19 2000 |
| MD5 Checksum: | 7e3fc8430f09ece5d1ec86b15a8e0911 |
|
| /// File Name: |
AdvancedWinServiceManager.zip |
Description:
|
AdvancedWinServiceManager is a smart tool to remove hidden rootkit services. It makes it easy to eliminate such malicious services by separating out third party services from Windows services. By default it shows only third party services along with more details such as Company Name, Description, Install Date, File Path etc at one place which helps in quickly differentiating between legitimate and malicious services. It comes with rich features such as detecting hidden rootkit services, exporting the service list to html based log file, displaying only third party services etc.
| | Homepage: | http://www.spywareanalytics.com/ | | File Size: | 226161 | | Last Modified: | Mar 6 10:33:26 2010 |
| MD5 Checksum: | edff068f86952106dba21a8ffe5e9a9d |
|
| /// File Name: |
aH1.zip |
Description:
|
aH scans for open NetBIOS shares on a system and reports them to the user in an easy to use copy and paste format utilizing the net command. C++ source code and binary included.
| | Author: | r-22 | | Homepage: | http://www.manshadow.org/projects/aH/ | | File Size: | 24517 | | Last Modified: | Mar 10 22:16:46 2003 |
| MD5 Checksum: | 656fffd42dc52226dae267b6d32a3913 |
|
| /// File Name: |
ah1_0beta.zip |
Description:
|
Assault Hackworks is a security scanning tool which features include subnet management, exploiting NBT security hole with easy access to remote files via Explorer-like interface, and scanning for Khe Sanh servers.
| | Homepage: | http://dive.to/ita | | File Size: | 1207797 | | Last Modified: | Apr 27 21:09:05 2001 |
| MD5 Checksum: | 4a898f3dc17dce2ded28b6125e415c5c |
|
| /// File Name: |
Alcatel.zip |
Description:
|
Alcatel.zip is a Windows tool for getting the challenge response for easy offline config of an alcatel modem. Often used for "patching" a speedtouch home to pro, as discussed on http://brunning.com.
| | Author: | Autor Herman | | Homepage: | http://www.bruring.com/adsl/ | | File Size: | 19515 | | Last Modified: | Apr 25 00:58:51 2002 |
| MD5 Checksum: | d20b862383bca011585fd66738ba9152 |
|
| /// File Name: |
alpr.zip |
Description:
|
Advanced Lotus Password Recovery v1.02 is a program to recover lost or forgotten passwords to the files/documents created in IBM/Lotus applications (all versions): Organizer, WordPro, 1-2-3 and Approach. The passwords are recovered instantly; multilingual passwords are supported.
| | Homepage: | http://www.elcomsoft.com/alpr.html | | File Size: | 650682 | | Last Modified: | Dec 18 20:33:23 2000 |
| MD5 Checksum: | c8679e6d683159664a9ede5d0c357224 |
|
| /// File Name: |
antimeter.zip |
Description:
|
This is a small tool that scans memory to detect and kill Metasploit's meterpreter.
| | Author: | Mert SARICA | | Homepage: | http://www.mertsarica.com/ | | File Size: | 2331680 | | Last Modified: | May 22 14:56:18 2010 |
| MD5 Checksum: | 13d6e85413c467d68c2202dd7d11ccaa |
|
| /// File Name: |
antimeter2.zip |
Description:
|
This is a small tool that scans memory to detect and kill Metasploit's meterpreter.
| | Author: | Mert SARICA | | Homepage: | http://www.mertsarica.com/ | | Changes: | Added a logging feature, auto kill feature, detection mode only and exclusion support. | | File Size: | 2359814 | | Last Modified: | May 26 20:20:18 2010 |
| MD5 Checksum: | c01d2b32294164ee4e39b03507e535a9 |
|
| /// File Name: |
ao20pr_p.zip |
Description:
|
Advanced Office 2000 Password Recovery (professional edition) - Recovers lost passwords for Microsoft Word, Excel, Access, PowerPoint 97, Project, Money, Outlook, Backup, Schedule+, Mail, IE 3, 4, and 5, Visio 4 and 5, and others. All passwords are decrypted instantly except Word/Excel 97/2000 which has strong crypto and is only vulnerable to brute force attack. 30 day trial, although it does not actually expire.
| | Homepage: | http://www.elcomsoft.com/ao2000pr.html | | File Size: | 971536 | | Last Modified: | Dec 15 20:05:24 2000 |
| MD5 Checksum: | c85be087f2ef1e373d2703874add42b4 |
|
| /// File Name: |
Apache-Chunked-Scanner.zip |
Description:
|
Apache Chunked Transfer vulnerability scanner for Windows. Does not check the banner - crashes a thread and watches the web server behavior.
| | Author: | Felipe Moniz | | Homepage: | http://www.nstalker.com | | File Size: | 243812 | | Last Modified: | Jun 29 13:41:19 2002 |
| MD5 Checksum: | 009aa8ca460938ac21e0b42bd3acf00c |
|
| /// File Name: |
archpr.zip |
Description:
|
Advanced Archive Password Recovery (or ARCHPR for short) can be used to recover lost or forgotten passwords to ZIP (PKZip, WinZip), ARJ/WinARJ, RAR/WinRAR and ACE/WinACE archives. At the moment, there is no known method to extract the password from such compressed files, so the only available methods are "brute force" and dictionary attacks (for ARJ and ZIP formats, known-plaintext attack is also available).
| | Homepage: | http://www.elcomsoft.com/archpr.html | | File Size: | 733155 | | Last Modified: | Dec 18 20:35:45 2000 |
| MD5 Checksum: | ef3ab37d8ced965628df95d51ff1b54f |
|
| /// File Name: |
arpinject.zip |
Description:
|
ARPInject v0.1 is a windows tool which sends custom ARP reply packets at a specified interval, causing most systems to update their arp tables. Requires Winpcap.
| | Author: | Blade | | File Size: | 218078 | | Last Modified: | Apr 9 01:37:41 2001 |
| MD5 Checksum: | de77274988919ae235919e2f535cc8d7 |
|
| /// File Name: |
arptoxin.exe |
Description:
|
ARPToxin is a fully functional command line ARP Poisoning utility for the Windows platform which uses winpcap. Includes preset modes of operation for different attacks and the ability to change any field in the ARP packet.
| | Author: | Phrite | | Homepage: | http://www.phrite.net/default.php?page=tools | | File Size: | 61440 | | Last Modified: | Dec 16 15:08:37 2003 |
| MD5 Checksum: | 22d8fcd774b35c9480df44dcc81b0880 |
|
| /// File Name: |
ArpWorks10.EXE |
Description:
|
ArpWorks v1.0 is a utility for Windows which sends customized Arp Announce packets over the network. All ARP parameters, including the Ethernet Source MAC address can be changed. Also features an IP to MAC resolver, subnet MAC discovery, host isolation, packets redirection, and IP conflict packets.
| | Author: | Mao | | File Size: | 342371 | | Last Modified: | Jul 25 19:47:17 2000 |
| MD5 Checksum: | 61f048ae6dd0bb719ce4bb9d91689c60 |
|
| /// File Name: |
atk-2.0.zip |
Description:
|
Attack Tool Kit, or ATK, was developed to provide a very small and handy tool for performing simple security checks on Windows. It requires minimal interaction and is very modular in design.
| | Author: | Marc Ruef | | Homepage: | http://www.computec.ch/projekte/atk/ | | File Size: | 992092 | | Last Modified: | Sep 8 18:00:37 2004 |
| MD5 Checksum: | dd0ae72cd5aeefc2ae1d1ea3072ee6a4 |
|
| /// File Name: |
atk-3.0.zip |
Description:
|
The Attack Tool Kit (ATK) is an open-source utility to perform vulnerability checks and enhance security audits. The most important changes in ATK 3.0 are the introduction of a dedicated exploiting routine and the Plugin AutoUpdate (over HTTP). Check the website for more details. Binary version.
| | Author: | Marc Ruef | | Homepage: | http://www.computec.ch/projekte/atk/ | | Related File: | atk-3.0src.zip | | File Size: | 1296250 | | Last Modified: | Nov 20 14:06:18 2004 |
| MD5 Checksum: | b07eb5e0268aef658ac9205b772070cd |
|
| /// File Name: |
atk-3.0src.zip |
Description:
|
The Attack Tool Kit (ATK) is an open-source utility to perform vulnerability checks and enhance security audits. The most important changes in ATK 3.0 are the introduction of a dedicated exploiting routine and the Plugin AutoUpdate (over HTTP). Check the website for more details. Source version.
| | Author: | Marc Ruef | | Homepage: | http://www.computec.ch/projekte/atk/ | | Related File: | atk-3.0.zip | | File Size: | 648922 | | Last Modified: | Nov 20 14:06:47 2004 |
| MD5 Checksum: | 81d9769516693346e33b68eb4d2f9a8e |
|
| /// File Name: |
ATLAS.ZIP |
Description:
|
Windows / Dos CGI scanner (binary only) which checks for 65 remote vulnerabilities.
| | Author: | Digital Monkey | | File Size: | 24358 | | Last Modified: | Dec 17 23:52:41 1999 |
| MD5 Checksum: | 25c81706316875ae889ea753dcc42546 |
|
| /// File Name: |
attacker.zip |
Description:
|
Attacker v3.0 is a TCP/UDP port listener. You provide a list of ports to listen on and the program will notify you when a connection or data arrives at the port(s). Can minimize to the system tray and play an audible alert. This program is intended to act as a guard dog to notify you of attempted probes to your computer via the Internet.
| | Author: | Robin Keir | | Homepage: | http://www.foundstone.com | | File Size: | 24252 | | Last Modified: | Dec 14 21:59:09 2000 |
| MD5 Checksum: | e5ca4ee8d9a9d075a9272fddbf49fbd7 |
|
| /// File Name: |
auto.txt |
Description:
|
Auto.txt lists eleven known and unknown methods of starting programs upon bootup in Windows. Trojans, backdoors, and keyloggers often use these to restart themselves.
| | Homepage: | http://www.tlsecurity.net | | File Size: | 6395 | | Last Modified: | Mar 15 20:14:09 2001 |
| MD5 Checksum: | 3ebed47c33e095692bde2be83dcd1d1c |
|
|
|
|
|