Month: August 2012

84 Results / Page 1 of 10

todayAugust 31, 2012

close

Tools NJ Ouchn

Patriot NG 2.01 the Windows HiDS available

Patriot is a ‘Host IDS’ tool which allows real time monitoring of changes in Windows systems or Network attacks. Patriot monitors: Changes in Registry keys: Indicating whether any sensitive key (autorun, internet explorer settings…) is altered. New files in ‘Startup’ directories New Users in the System New Services installed Changes ...

todayAugust 29, 2012

close

Tools NJ Ouchn

NetworkMiner updated to v1.4.1

NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows. NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc. without putting any traffic on the network. NetworkMiner can also parse PCAP files for off-line analysis and to regenerate/reassemble transmitted files ...

todayAugust 29, 2012

close

Tools NJ Ouchn

The Social-Engineer Toolkit “Street Cred” 3.7.1 available

The Social-Engineer Toolkit (SET) was created and written by the founder of TrustedSec. It is an open-source Python-driven tool aimed at penetration testing around Social-Engineering. SET has been presented at large-scale conferences including Blackhat, DerbyCon, Defcon, and ShmooCon. With over two million downloads, SET is the standard for social-engineering penetration ...

todayAugust 23, 2012

close

Tools NJ Ouchn

Kautilya 0.3.0 Released – Breaking Mac OS X with USB HID

Kautilya is a toolkit which provides various payloads for Teensy device which may help in breaking in a computer. The toolkit is written in Ruby. The Windows payloads and modules are written mostly in powershell (in combination with native commands) and are tested on Windows 7. The Linux payloads are mostly commands in combination with ...

todayAugust 21, 2012

close

Tools MaxiSoler

Suricata v1.3.1 Released

Suricata is a rule-based ID/PS engine that utilises externally developed rule sets to monitor network traffic and provide alerts to the system administrator when suspicious events occur. Designed to be compatible with existing network security components, Suricata features unified output functionality and pluggable library options to accept calls from other applications.


LOGO

  • help@firwl.com
  • info@firwl.com


Products


Company


Contacts

Support


LOGO

  • help@firwl.com
  • info@firwl.com


Products


Company


Contacts

Support