Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1000 servers, and version specific problems on over 270 servers.
Cyberwatch is the 1st automated IT vulnerabilities fixer.More than 8000 vulnerabilities are discovered every year.Hackers use them to attack you. Cyberwatch automatically fixes them for you.Our unique technology, automatically finds and fixes your servers vulnerabilities as soon as they are published by the authorities so you can benefit from a......
Dependency-Check is a utility that identifies project dependencies and checks if there are any known, publicly disclosed, vulnerabilities. Currently Java and .NET dependencies are supported.......
Welcome to PatrolServer. We scan your server real-time for outdated software and exploits. All delivered by mail and an easy to use dashboard.......
The most complete and advanced IT security professional toolkit on Android.- enumerate local hostsdone- find vulnerabilitiesdone- find exploits for these vulnerabilitiesdone- use those exploits to gain access to the targetdone- crack wifi passwords- install backdoors for later access- Portability: It can run on any UNIX-based system, but for now only......
Intruder is a proactive security monitoring platform for internet-facing systems.Cyber threats are ever-changing and require dedicated oversight. Existing services are inadequate, overly complex to configure and operate, and the jargon produced is often confusing, requiring specialist interpretation.Intruder provides a simple cloud based security solution which continually scans your digital assets,......
NopSec Unified VRM® provides up to a 40% time savings for security teams by eliminating the manual tasks involved with vulnerability risk management. Our cloud-base solution helps you identify, prioritize, proactively manage and report on IT vulnerabilities and security breaches from a single platform.Our Differentiators:1. Adaptive Expert Intelligence - Offers......
The victims project provides a canonical database of known-vulnerable JAR files, along with tools to compare this database to Java applications in development, release and production environments.......
Protect your sensitive data and privacy, and securely erase all evidence of your Internet and PC activity. Go beyond any system optimization or cleanup tool, improve your PC performance, and keep it clean and secure! east-tec Eraser has been continuously improved since its launch in 1998, and exceeds government and......
# What is Naxsi?NAXSI means Nginx Anti XSS & SQL Injection.Technically, it is a third party nginx module, available as a package for many UNIX-like platforms. This module, by default, reads a small subset of simple (and readable) rules containing 99% of known patterns involved in website vulnerabilities. For example,......
OnionMail is an anonymous and encrypted mail server designed to run on the TOR network without losing the ability to communicate with the Internet. This ensures greater privacy to the users but also protect against eavesdropping of the NSA and others.......
Grabber is a web application scanner. Basically it detects some kind of vulnerabilities in your website.Grabber is simple, not fast, but portable and really adaptable. This software is designed to scan small websites such as personal sites, forums etc. It is a very small application: it would take too much......
The SSL/TLS and Certificate tutorial for Windows enables you to fast track your understanding of the SSL/TLS protocol, Certificate Management, and secure communication. The download includes many C source code examples, including a secure WebSocket tutorial. You can either compile the examples "as is" or modify them to suite your......
Do you have sensitive files you would like to password-protect but don’t know how? With Safeplicity, you can password-protect AND encrypt all your confidential files in just a few clicks, without any IT skills whatsoever. To protect a folder, you simply right-click on it, choose “Protect with Password” and choose......
Lynis is an open source security auditing tool. Primary goal is to help users with auditing and hardening of Unix and Linux based systems. The software is very flexible and runs on almost every Unix based system (including Mac). Even the installation of the software itself is optional!How it worksLynis......
Exploit Pack is an open source project maintained only by me. It has now 5 years in the market. It’s NOT a replacement for metasploit or core impact.It’s a different approach you can use it to conduct a pentest, a real one, not only press enter in the command line.......
About | Terms |
About UsContact Us | TpSort ScorePrivacy PoliceDMCA Policy |
© 2015-2016 www.tpsort.com, Inc