Posts Tagged ‘Tools’

PRET is a new tool for printer security testing developed in the scope of a Master’s Thesis at Ruhr University Bochum. It connects to a device via network or USB and exploits the features of a given printer language. Currently PostScript, PJL and PCL are supported which are spoken by most laser printers. This allows cool stuff like capturing or manipulating print jobs, accessing the printer’s file system and memory or even causing physical damage to the device. All attacks are documented in detail in the Hacking Printers Wiki.

The main idea of PRET is to facilitate the communication between the end-user and the printer. Thus, after entering a UNIX-like command, PRET translates it to PostScript, PJL or PCL, sends it to the printer, evaluates the result and translates it back to a user-friendly format. PRET offers a whole bunch of commands useful for printer attacks and fuzzing.

Installation

# pip install colorama pysnmp
# pip install win_unicode_console
# apt-get install imagemagick ghostscript
git clone https://github.com/RUB-NDS/PRET.git

Usage

usage: pret.py [-h] [-s] [-q] [-d] [-i file] [-o file] target {ps,pjl,pcl}
positional arguments:
target                printer device or hostname
{ps,pjl,pcl}          printing language to abuse
optional arguments:
-h, --help            show this help message and exit
-s, --safe            verify if language is supported
-q, --quiet           suppress warnings and chit-chat
-d, --debug           enter debug mode (show traffic)
-i file, --load file  load and run commands from file
-o file, --log file   log raw data sent to the target

 Source

https://github.com/RUB-NDS/PRET

Advertisements

hackers_4996108_lrgMost penetration testers are using either a Mac or a Linux-based platform in order to perform their penetration testing activities.However it is always a good practice to have and a Windows virtual machine with some tools ready to be used for the engagement.The reason for this is that although Windows cannot be used as a main platform for penetration testing some of the utilities and tools can still help us to extract information from our windows targets.So in this post we will see some of the tools that we can use in our windows system.

HashCheck Shell Extension

The HashCheck Shell Extension makes it easy for anyone to calculate and verify checksums and hashes from Windows Explorer. In addition to integrating file checksumming functionality into Windows, HashCheck can also create and verify SFV files (and other forms of checksum files, such as .md5 files).

Netcat

Netcat is often referred to as a “Swiss-army knife for TCP/IP”. Its list of features includes port scanning, transferring files, and port listening, and it can be used as a backdoor.

Metasploit Framework

The Metasploit Project is a computer security project which provides information about security vulnerabilities and aids in penetration testing and IDS signature development.

RealVNC Viewer

Remote access software for desktop and mobile platforms.

GetIf

SNMP tool that allows you to collect information about SNMP devices.

Cain & Abel

Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols.

Wireshark

Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development.

PuTTY

PuTTY is an SSH and telnet client for the Windows platform.

Pass The Hash Toolkit

The Pass-The-Hash Toolkit contains utilities to manipulate the Windows Logon Sessions mantained by the LSA (Local Security Authority) component. These tools allow you to list the current logon sessions with its corresponding NTLM credentials (e.g.: users remotely logged in thru Remote Desktop/Terminal Services), and also change in runtime the current username, domain name, and NTLM hashes.

Cachedump

Recovering Windows Password Cache Entries.

Fport

Identify unknown open ports and their associated applications.

Nbtscan

This is a command-line tool that scans for open NETBIOS nameservers on a local or remote TCP/IP network, and this is a first step in finding of open shares.

Burp Suite

Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application’s attack surface, through to finding and exploiting security vulnerabilities.

Winfo

Winfo uses null sessions to remotely try to retrieve lists of and information about user accounts, workstation/interdomain/server trust accounts, shares (also hidden), sessions, logged in users, and password/lockout policy, from Windows NT/2000/XP. It also identifies the built-in Administrator and Guest accounts, even if their names have been changed.

ClearLogs

ClearLogs clears the event log (Security, System or Application) that you specify. You run it from the Command Prompt, and it can also clear logs on a remote computer.

SQLDict

SQLdict is a dictionary attack tool for SQL Server.

PMDump

PMDump is a tool that lets you dump the memory contents of a process to a file without stopping the process.

GrabItAll

GrabItAll performs traffic redirection by sending spoofed ARP replies. It can redirect traffic from one computer to the attackers computer, or redirect traffic between two other computers through the attackers computer. In the last case you need to enable IP Forwarding which can be done with GrabItAll too.

DumpUsers

DumpUsers is able to dump account names and information even though RestrictAnonymous has been set to 1.

BrowseList

BrowseList retrieves the browse list. The output list contains computer names, and the roles they play in the network. For example you can see which are PDC, BDC, stand-alone servers and workstations. You can also see the system comments (which can be very interesting reading).

Remoxec

Remoxec executes a program using RPC (Task Scheduler) or DCOM (Windows Management Instrumentation).

WMICracker

Brute-force tool for Windows Management Instrumentation (WMI).

Venom

Venom is a tool to run dictionary password attacks against Windows accounts by using the Windows Management Instrumentation (WMI) service. This can be useful in those cases where the server service has been disabled.

SMBAT

The SMB Auditing Tool is a password auditing tool for the Windows-and the SMB-platform. It makes it possible to exploit the timeout architecture bug in Windows 2000/XP, making it extremly fast to guess passwords on these platforms.

RPCScan

RPCScan v2.03 is a Windows based detection and analysis utility that can quickly and accurately identify Microsoft operating systems that are vulnerable to the multiple buffer overflow vulnerabilities released in the MS03-026 and MS03-039 bulletins.

LSASecretsDump

LSASecretsDump is a small console application that extract the LSA secrets from the Registry, decrypt them, and dump them into the console window.

SQLPing

SQL Ping is a nice little command line enumerator that specifically looks for SQL servers and requires no authentication whatsoever.

OAT

The Oracle Auditing Tools is a toolkit that could be used to audit security within Oracle database servers.

Pwdump7

Extract password hashes from local user accounts.

PsTools

The PsTools package provides a set of command line utilities that allow you to manage local and remote systems.

Incognito

Incognito is a tool for manipulating windows access tokens and is intended for use by penetration testers, security consultants and system administrators.

DumpSec

DumpSec is a security auditing program for Microsoft Windows® NT/XP/200x. It dumps the permissions (DACLs) and audit settings (SACLs) for the file system, registry, printers and shares in a concise, readable format, so that holes in system security are readily apparent. DumpSec also dumps user, group and replication information.

X-Deep32

X-Deep/32 is an X Window Server for Windows NT/2000/9X/ME/XP that can be used to connect to host systems running UNIX, LINUX, IBM AIX etc.

LC5

Windows password cracker.

Ophcrack

Ophcrack is a free Windows password cracker based on rainbow tables.

SiVuS

SiVus is the first publicly available vulnerability scanner for VoIP networks that use the SIP protocol. It provides powerful features to assess the security and robustness of VoIP implementations.

tv crime2

1. Nmap
Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap homepage.

2. Wireshark
Wireshark is a network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network. Wireshark homepage.

3. Metasploit Community edition
Metasploit Community Edition simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of vulnerability scanners. This helps prioritize remediation and eliminate false positives, providing true security risk intelligence. Metasploit community edition homepage.

4. Nikto2
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1200 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software. Nikto2 homepage.

5. John the Ripper
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix systems, supported out of the box are Windows LM hashes, plus lots of other hashes and ciphers in the community-enhanced version. John the Ripper homepage.

6. ettercap
Ettercap is a comprehensive suite for man in the middle attacks. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols and includes many features for network and host analysis. ettercap homepage.

7. NexPose Community edition
The Nexpose Community Edition is a free, single-user vulnerability management solution. Nexpose Community Edition is powered by the same scan engine as Nexpose Enterprise and offers many of the same features. Nexpose homepage.

8. Ncat
Ncat is a feature-packed networking utility which reads and writes data across networks from the command line. Ncat was written for the Nmap Project as a much-improved reimplementation of the venerable Netcat. It uses both TCP and UDP for communication and is designed to be a reliable back-end tool to instantly provide network connectivity to other applications and users. Ncat will not only work with IPv4 and IPv6 but provides the user with a virtually limitless number of potential uses. ncat homepage.

9. Kismet
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and (with appropriate hardware) can sniff 802.11b, 802.11a, 802.11g, and 802.11n traffic. Kismet also supports plugins which allow sniffing other media such as DECT. kismet homepage.

10. w3af
w3af is a Web Application Attack and Audit Framework. The project’s goal is to create a framework to find and exploit web application vulnerabilities that is easy to use and extend. w3af homepage.

11. hping
hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping(8) unix command, but hping isn’t only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features. hping homepage.

12. burpsuite
Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application’s attack surface, through to finding and exploiting security vulnerabilities. BurpSuite homepage.

13. THC-Hydra
A very fast network logon cracker which support many different services.  hydra homepage.

14. sqlmap
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections. sqlmap homepage.

15. webscarab
WebScarab has a large amount of functionality, and as such can be quite intimidating to the new user. But, for the simplest case, intercepting and modifying requests and responses between a browser and HTTP/S server, there is not a lot that needs to be learned. WebScarab homepage.

Caintech.co.uk

1. Nmap

Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap homepage.

2. Wireshark

Wireshark is a network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network. Wireshark homepage.

3. Metasploit Community edition

Metasploit Community Edition simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of vulnerability scanners. This helps prioritize remediation and eliminate false positives, providing true security risk intelligence. Metasploit community edition homepage.

4. Nikto2

Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1200 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software. Nikto2 homepage.

5. John the Ripper

John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix systems, supported out of the box are Windows LM hashes, plus lots of other hashes and ciphers in the community-enhanced version. John the Ripper homepage.

6. ettercap

Ettercap is a comprehensive suite for man in the middle attacks. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols and includes many features for network and host analysis. ettercap homepage.

7. NexPose Community edition

The Nexpose Community Edition is a free, single-user vulnerability management solution. Nexpose Community Edition is powered by the same scan engine as Nexpose Enterprise and offers many of the same features. Nexpose homepage.

8. Ncat

Ncat is a feature-packed networking utility which reads and writes data across networks from the command line. Ncat was written for the Nmap Project as a much-improved reimplementation of the venerable Netcat. It uses both TCP and UDP for communication and is designed to be a reliable back-end tool to instantly provide network connectivity to other applications and users. Ncat will not only work with IPv4 and IPv6 but provides the user with a virtually limitless number of potential uses. ncat homepage.

9. Kismet

Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and (with appropriate hardware) can sniff 802.11b, 802.11a, 802.11g, and 802.11n traffic. Kismet also supports plugins which allow sniffing other media such as DECT. kismet homepage.

10. w3af

w3af is a Web Application Attack and Audit Framework. The project’s goal is to create a framework to find and exploit web application vulnerabilities that is easy to use and extend. w3af homepage.

11. hping

hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping(8) unix command, but hping isn’t only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features. hping homepage.

12. burpsuite

Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application’s attack surface, through to finding and exploiting security vulnerabilities. BurpSuite homepage.

13. THC-Hydra

A very fast network logon cracker which support many different services.  hydra homepage.

14. sqlmap

sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections. sqlmap homepage.

15. webscarab

WebScarab has a large amount of functionality, and as such can be quite intimidating to the new user. But, for the simplest case, intercepting and modifying requests and responses between a browser and HTTP/S server, there is not a lot that needs to be learned. WebScarab homepage.

 

Caintech.co.uk

We know administrators love tools that make life easier, especially when they’re free! So here are 100 of them!

Any free tools you know of that are missing from this list? Leave us a comment!

 

System and network analysis

1. NTFS Permissions Explorer

Using this MMC snap-in you can quickly visualize the user and group permissions of a local or remote folder or drive in a hierarchical format to help identify problems.

http://eprints.hud.ac.uk/9743/

2. Xirrus Wi-Fi Inspector

Wi-Fi Inspector is a powerful Wi-Fi management and troubleshooting tool that allows you to locate and verify Wi-Fi devices, detect rogue Access Points, troubleshoot connections, and search for Wi-Fi networks.

http://www.xirrus.com/library/wifitools.php

3. Whois

Whois performs a lookup of the registration information of a given IP address or domain name.

http://technet.microsoft.com/en-gb/sysinternals/bb897435

4. ShareEnum

ShareEnum allows you to scan and view the security settings of file shares on your network.

http://technet.microsoft.com/en-gb/sysinternals/bb897442

5. PipeList

PipeList displays a list of named pipes on your system, including the number of active instances and the instance threshold.

http://technet.microsoft.com/en-gb/sysinternals/dd581625

6. TcpView

TCPView allows you to view detailed TCP and UDP connection information in a user friendly format.

http://technet.microsoft.com/en-gb/sysinternals/bb897437

7. The Dude

The Dude from MicroTik can automatically scan all devices within a given subnet and then draw and layout a map of your network.

http://www.mikrotik.com/thedude.php

8. Microsoft Baseline Security Analyzer

The MBSA is a tool that can be used to detect missing security updates and typical security misconfigurations.

http://technet.microsoft.com/en-gb/security/cc184923

9. WireShark

WireShark is an interactive network protocol analyser and capture utility. It provides for in-depth inspection of hundreds of protocols and runs on multiple platforms.

http://www.wireshark.org/download.html

10. Look@LAN

Look@LAN allows you to quickly scan your network looking for active nodes. It provides monitoring, reporting, logging and OS detection features.

http://download.cnet.com/Look-LAN-Network-Monitor/3000-2085_4-10145550.html

11. RogueScanner

RogueScanner will scan your network looking for rogue devices and access points, classifying them in a way that allows you to quickly see what’s on your network.

http://www.gotomanage.com/open_source_tools/roguescanner

12. Capsa Free Network Analyzer

Using this tool you can monitor, troubleshoot and diagnose issues on your network. It has a Microsoft Office-like user interface.

http://www.colasoft.com/capsa/capsa-free-edition.php

13. SuperScan

SuperScan is a fast connection-based TCP port scanner, pinger and hostname resolution tool.

http://www.mcafee.com/us/downloads/free-tools/superscan3.aspx

14. Blast

Blast is a lightweight TCP service stress test tool that can help pinpoint weaknesses in your network.

http://www.mcafee.com/us/downloads/free-tools/blast.aspx

15. UDPFlood

UDPFlood is a lightweight UDP service stress test tool that sends out packets to a specified IP or port.

http://www.mcafee.com/us/downloads/free-tools/udpflood.aspx

16. IPplan

This tool allows you to quickly and easily track and manage your network IP addresses.

http://iptrack.sourceforge.net/

17. NetStumbler

NetStumbler is an application that allows you to detect the presence of a wireless network using 802.11a/b/g. It is useful for detecting rogue access points, finding locations with poor signal, verifying network configurations and determining the cause of wireless interference.

http://www.stumbler.net/

18. PingPlotter

PingPlotter is a lightweight tracert application that generates graphs to help you visualize the route of the packets from source to destination.

http://www.pingplotter.com/download.html

19. SolarWinds Free Permissions Analyzer for AD

Using this tool you can quickly visualize the user and group permissions of a folder or shared drive in a hierarchical format. It can track share level permissions, provide a breakdown of share level and file level permissions and help identify why certain users have the permissions they do.

http://www.solarwinds.com/products/freetools/permissions_analyzer_for_active_directory/

20. Angry IP Scanner

Angry IP Scanner is a fast standalone IP address and port scanner.

http://www.angryip.org/w/Download

21. FreePortMonitor

FreePortMonitor is a tool for monitoring servers and applications on your network.

http://www.freeportmonitor.com/

22. WirelessNetView

WirelessNetView monitors the activity of wireless networks in the area and displays information related to them, such as SSID, Signal Quality, MAC Address, Channel Frequency, etc.

http://www.nirsoft.net/utils/wireless_network_view.html

23. BluetoothView

BluetoothView monitors the activity of Bluetooth devices in the area and displays information related to them, such as Device Name, Bluetooth Address, Device Type, etc.

http://www.nirsoft.net/utils/wireless_network_view.html

24. Vision

Vision allows you to view all open TCP and UDP ports and then maps them back to the owning process or application.

http://www.mcafee.com/us/downloads/free-tools/vision.aspx

25. Attacker

Attacker is a TCP/UDP port listener that allows you to define a list of ports that you want it to listen on and it will notify you when a connection is established on that port.

http://www.mcafee.com/us/downloads/free-tools/attacker.aspx

26. Total Network Monitor

Total Network Monitor is a comprehensive network monitoring application that allows you to view the state of your network. It is customizable and has advanced alerting features, letting you know when something is wrong.

http://www.softinventive.com/products/total-network-monitor/

27. IIS Logfile Analyser

This tool allows you to analyse your IIS logfiles to determine website statistics such as number of visitors, number of downloads, etc.

http://www.nodesoft.com/iislogfileanalyser/

28. ntop

ntop uses a web-based interface that allows you to monitor network traffic and statistics.

http://www.ntop.org/download.html

System testing and troubleshooting

29. Pinkie

Pinkie is a collection of network troubleshooting utilities that allows pinging multiple hosts, forward and reverse DNS lookup, a ping sweeper, and a subnet calculator.

http://www.ipuptime.net/

30. VMWare Player

VMWare Player is a multi-platform virtualization solution that can be used to create and run multiple 32-bit or 64-bit virtual machines. Ideal for testing or development environments.

http://downloads.vmware.com/d/info/desktop_downloads/vmware_player/3_0

31. Oracle VirtualBox

VirtualBox is a free, multi-platform general-purpose virtualization solution that can be used to create and run multiple virtual machines. Ideal for testing or development environments.

http://www.virtualbox.org/wiki/Downloads

32. ADInsight

ADInsight is a real-time monitoring tool used for troubleshooting LDAP (Lightweight Directory Access Protocol) clients.

http://technet.microsoft.com/en-gb/sysinternals/bb897539

33. Process Monitor

Process Monitor allows you to monitor activity related to processes, threads, DLLs, the registry and file system in real-time. Useful for troubleshooting application and system related issues.

http://technet.microsoft.com/en-gb/sysinternals/bb896645

34. SpiceWorks Network Troubleshooting

SpiceWorks Network Troubleshooting is an all-in-one tool that allows you to perform routine troubleshooting tasks such as killing processes remotely, access devices remotely, ping, tracert and nslookup, and even compare the status of two devices.

http://www.spiceworks.com/free-network-troubleshooting-tool/

35. RAMMap

RAMMap allows you to analyse physical memory allocation in your system. You are able to determine how much file data is cached in RAM, how much RAM is used by the kernel and device drivers, etc.

http://technet.microsoft.com/en-gb/sysinternals/ff700229

36. Autoruns

Autoruns allows you to view which programs are configured to run at system boot up or login.

http://technet.microsoft.com/en-gb/sysinternals/bb963902

37. LogFusion

Using LogFusion you can view and monitor log files in real-time.

http://www.logfusion.ca/

38. Microsoft Log Parser

Using Microsoft Log Parser you can generate a custom-formatted output file containing the results of multiple log file sources such as XML, CSV, Event Logs, or the Registry.

http://www.microsoft.com/downloads/en/details.aspx?FamilyID=890cd06b-abf8-4c25-91b2-f8d975cf8c07

39. AppCrashView

AppCrashView allows you to view Windows Error Reporting (*.WER) files in a simple user interface and then save the results into TXT/CSV/HTML/XML file format.

http://www.nirsoft.net/utils/app_crash_view.html

40. RootKitRevealer

RootKitRevealer allows you to detect the presence of rootkits that operate by attempting to hide their files or registry entries.

http://technet.microsoft.com/en-gb/sysinternals/bb897445

System and network management

41. Bitcricket IP Subnet Calculator

This tool allows you to calculate subnets and CIDR routes automatically using its intuitive interface and auto-discovery feature.

http://www.wildpackets.com/resources/free_utilities/ipsubnetcalc

42. EMCO Remote Installer Starter

The free version of EMCO Remote Installer (Starter edition) allows you to perform a software inventory of applications installed on your network. You can retrieve and track changes as well as save reports.

http://emcosoftware.com/products/remote-installer/features.php

43. ManagePC

ManagePC allows you to create an inventory of all your machines in the domain, including hardware, software, devices, patches, group policies, etc.

http://managepc.net/

44. Pandora FMS

Pandora FMS is a network monitoring solution that allows you to monitor multiple platforms, from Linux machines, to Solaris machine, to Windows machines. It provides alerts and reporting for CPU, disk and memory usage, temperature, or even application values.

http://pandorafms.org/index.php?sec=project&sec2=downloads&lng=en

45. SNARE Audit and EventLog Management

SNARE (System iNtrusion Analysis and Reporting Environment) allows you to install agents onto your server machines to facilitate the centralized collection of logs, including Windows, Solaris, AIX, ISA Server, IIS Server, SMTP, Exchange, Apache, etc.

http://www.intersectalliance.com/projects/index.html

46. OCS Inventory

OCS Inventory is an automated inventory and deployment application. It allows you to determine what devices or software are installed on your network and deploy software or configuration scripts using a simple web-based interface.

http://www.ocsinventory-ng.org/index.php?page=downloads

47. Zenoss Core – Enterprise IT Monitoring

Using the Zenoss Core application, you can monitor systems availability, performance, events and configuration across the network.

http://sourceforge.net/projects/zenoss/

48. Unipress Free Help Desk

Unipress Free Help Desk is a simple yet powerful Help Desk solution that allows you to create, assign and receive issue tickets. It contains a web portal and knowledgebase for self-help.

http://www.unipress.co.uk/free-help-desk-software.html

49. SysAidIT Free Help Desk

Using this tool, you can easily manage and service requests and create an inventory of installed software and network devices on your network.

http://www.ilient.com/free-help-desk-software.htm

50. Cyberx Password Generator Pro

Cyberx Password Generator Pro allows you to create random highly secure passwords.

http://sourceforge.net/projects/cyberxpassgen/

51. KeePass Password Safe

KeePass is a lightweight, user-friendly password manager. It allows you to store all your passwords in a central location that is encrypted using military grade encryption.

http://keepass.info/download.html

52. TweakUAC

Using TweakUAC you can quickly enable, disable UAC or set it to quiet mode.

http://www.tweak-uac.com/download/

53. Microsoft Application Compatibility Toolkit

The Microsoft Application Compatibility Toolkit allows you to evaluate and mitigate application compatibility issues during the pre-deployment phase of a Windows 7, Windows Vista, or new Internet Explorer version installation.

http://www.microsoft.com/downloads/en/details.aspx?FamilyID=24da89e9-b581-47b0-b45e-492dd6da2971

54. ExtraSpy Employee Monitor

ExtraSpy Employee Monitor allows you to monitor employee activities across your network to help detect misuse of company property or unproductive individuals.

http://www.extraspy.com/

55. NetWrix USB Blocker Freeware

Using this tool you can centrally manage access control of removable media on your network.

http://www.netwrix.com/usb_blocker_freeware.html

56. FileZilla

FileZilla is a cross-platform FTP, FTPS and SFTP client.

http://filezilla-project.org/

57. Wake On Lan 2 .NET

The Wake On Lan 2 .NET tool allows you to manually or automatically power on, restart or shutdown machines or devices over your local network.

http://sourceforge.net/projects/wol2/

58. Speccy

Speccy is a system information tool that allows you to quickly see comprehensive details related to your machine.

http://www.piriform.com/speccy/download/standard

59. Active Directory Explorer (ADExplorer)

ADExplorer is an advanced Active Directory viewer and editor tool. It allows you to navigate through an Active Directory database and view and edit object properties and attributes.

http://technet.microsoft.com/en-gb/sysinternals/bb963907

60. ADRestore

ADRestore allows you to restore deleted Windows Server 2003 Active Directory server objects.

http://technet.microsoft.com/en-gb/sysinternals/bb963906

File and disk management

61. Disk2vhd

Disk2vhd allows you to create a Virtual Hard Disk (VHD) of a live machine, which can then be loaded using Microsoft Virtual PC or Microsoft Hyper-V.

http://technet.microsoft.com/en-gb/sysinternals/ee656415

62. Defraggler

Using Defragler you can defrag individual files on an NTFS or FAT32 file system.

http://www.piriform.com/defraggler

63. PageDefrag

PageDefrag allows you to view the defragmentation status of the system Page File and Registry Hives and defragments them. It also allows you to defragment events logs and Windows 2000/XP hibernation files.

http://technet.microsoft.com/en-gb/sysinternals/bb897426

64. PsPad

PsPad is a powerful text editor that can be used as a substitute for Notepad and is useful for creating scripts, programming, file comparison, etc.

http://www.pspad.com/en/download.php

65. MD5Summer

Using MD5Summer, you can quickly generate MD5 hashes for files within a folder, allowing you to ensure or verify file integrity.

http://www.md5summer.org/download.html

66. Universal Viewer

Universal Viewer is a multi-format file viewer that allows you to view different file types from a single interface. Supported file formats include Text, Image, MS Office, Audio, Video, amongst others.

http://www.uvviewsoft.com/download.htm

67. FreeCommander

FreeCommander is a comprehensive file manager that aims to be an alternative to Windows Explorer.

http://www.freecommander.com/fc_downl_en.htm

68. Recuva

Using Recuva you can recover files you accidentally deleted from your machine.

http://www.piriform.com/recuva/download/standard

69. Steganos LockNote

Steganos LockNote allows you to securely store confidential notes such as license keys, passwords, phone numbers, etc. It uses AES-256 encryption to store your text in a self-executable container that requires a password to open it.

http://www.steganos.com/us/products/for-free/locknote/overview/

70. Microsoft SyncToy

SyncToy is an application that can be used as a backup utility to synchronized files and folders between two locations.

http://www.microsoft.com/downloads/en/details.aspx?FamilyID=c26efa36-98e0-4ee9-a7c5-98d0592d8c52

71. PsTools

PsTools is a suite of tools that help you to administer your systems. The tools including in the package allow you to display, execute and kill processes remotely, retrieve system and logon information, and control account passwords and services.

http://technet.microsoft.com/en-gb/sysinternals/bb896649

72. PeaZip

PeaZip is a cross-platform file and archive manager that supports volume spanning, high levels of compression and encryption and support for a wide range of archiving formats.

http://sourceforge.net/projects/peazip/

73. Bacula

Bacula is a suite of applications that allow for the backup, recovery and verification of data across a network.

http://sourceforge.net/projects/bacula/

74. Areca Backup

Areca Backup is a file-based backup application that supports incremental, image and delta backups to a local drive or an FTP server.

http://sourceforge.net/projects/areca/

75. DirSync Pro

Directory Synchronize Pro is a powerful synchronization utility used to synchronize the contents of a directory to a given location. It provides scheduling, filtering, and logging functionality.

http://sourceforge.net/projects/directorysync/

76. Amanda Network Backup

Amanda is a powerful multi-platform backup and archiving application that supports tape, disk, and optical media. Using a single master backup server, you can set Amanda to backup multiple clients across your network.

http://sourceforge.net/projects/amanda/

77. WebSynchronizer

WebSyncrhonizer allows you to manually or automatically backup, replicate and synchronize files to an FTP server or across your network.

http://sourceforge.net/projects/websynchronizer/

78. KGB Archiver

KGB Archiver is a file archiving tool with a high level of compression that uses AES-256 for its encryption feature.

http://sourceforge.net/projects/kgbarchiver/

79. Iometer

Iometer is a disk I/O performance analysis tool that allows you to perform stress tests and displays the read and write speed of a specified drive.

http://sourceforge.net/projects/iometer/

80. Notepad++

Notepad++ is a powerful text editor that can be used as a substitute for Notepad and is useful for creating scripts, programming, file comparison, etc.

http://notepad-plus-plus.org/download

Performance and availability monitoring

81. ManageEngine Free HyperV Performance Monitor

HyperV Performance Monitor allows you to monitor CPU, Memory, Disk and Network utilization of your Microsoft Hyper-V virtual servers. It displays the results in a dashboard.

http://www.manageengine.com/free-hyperv-performance-monitor/download.html

82. Nagios

Nagios is a powerful network monitoring tool that allows you to ensure that your critical systems, applications and services are always up and running. It provides features such as alerting, event handling, and reporting.

http://www.nagios.org/download/

83. ManageEngine Free Exchange Health Monitor

Exchange Health Monitor allows you to monitor CPU and memory resource utilization, mail queue status, POP/IMAP performance counters, mailbox users, etc of your Microsoft Exchange 2003/2007/2010 servers. It displays the results in a dashboard.

http://www.manageengine.com/products/exchange-health-monitor/download.html

84. Kratos Exchange Monitor

Kratos Exchange Monitor will continuously monitor your Microsoft Exchange Servers and provide a real-time view of its health, including mail queues, CPU and memory utilization, hard drive space, etc.

http://www.kratosnetworks.com/products/free_network_management_utilities/exchange_monitor_utility/

85. ManageEngine Free Windows Health Monitor

Windows Health Monitor allows you to monitor CPU and memory resource utilization, disk usage and I/O, running applications, etc of your Windows Client and Server machines. It displays the results in a dashboard.

http://www.manageengine.com/free-windows-health-monitor/download.html

86. ManageEngine Free Ping Tool

Free Ping Tool monitors the availability of servers, routers, switches, mail servers and web servers using the power of ICMP ping. It displays the results in a dashboard.

http://www.manageengine.com/free-ping-tool/download.html

87. ManageEngine Free SQL Health Monitor Tool

The SQL Health Monitor Tool will monitor the performance and availability of your Microsoft SQL Server 2005 and 2008 servers. It can monitor CPU, memory and disk usage, as well as SQL specific parameters such as page reads/writes and buffer cache. It displays the results in a dashboard.

http://www.manageengine.com/sql-performance-monitor/download.html

88. ManageEngine Free VM Configuration Tool

Using the VM Configuration Tool you can configure VMWare ESX virtual servers options like increasing or decreasing RAM and allocating more CPUs. It also monitors the performance of the virtual machines, reporting on CPU, memory, disk and network utilization.

http://www.manageengine.com/free-vmware-configuration/free-vm-configuration-index.html

89. Kratos Network Device Monitor

This tool allows you to monitor any SNMP devices on your network, ensuring their availability and performance.

http://www.kratosnetworks.com/products/free_network_management_utilities/device_problem_monitor/

90. IxChariot QCheck

QCheck is a small yet powerful network performance management tool that allows you to quickly check network response times, TCP/UDP throughput, streaming traffic, and troubleshoot wireless network performance problems.

http://www.ixchariot.com/products/datasheets/qcheck.html

91. EasyNetMonitor

A small, lightweight tool for monitoring local and remote hosts to determine if they are alive or not.

http://nicekit.com/net-monitor/best-free-net-monitor.htm

Remote management

92. Remote Desktop Manager

Remote Desktop Manager is a tool that allows you to centrally manage your remote connections. It support RDP, VNC, TeamViewer, FTP, SSH, Telnet, etc.

http://remotedesktopmanager.com/remotedesktopmanager/Home.aspx/Download

93. TightVNC

TightVNC is a cross-platform lightweight application used for remotely administering clients and server machines.

http://www.tightvnc.com/download.php

94. Microsoft RDCMan

RDCMan allows you to manage multiple remote desktop sessions from a single interface.

http://www.microsoft.com/downloads/en/details.aspx?FamilyID=4603c621-6de7-4ccb-9f51-d53dc7e48047

95. Terminals

Terminals are a secure multi-tab remote connection management client. It supports both terminal services and remote desktop client and allows you to better manage multiple connections from a single interface.

http://terminals.codeplex.com/

96. PsFile

PsFile displays a list of files on a system that are opened remotely and allows you to close them.

http://technet.microsoft.com/en-gb/sysinternals/bb897552

All-in-one toolkits

97. Net Tools 5.0

Net Tools is a comprehensive set of monitoring, network scanning, security and administration tools packed into an intuitive and user friendly UI. It includes 175 utilities including an Advanced Port Scanner, TCP Packet Sniffer, Bandwidth Monitor, Hash MD5 Checker, Fast FTP Client, and Standard Encrypter.

http://mabsoft.com/nettools.htm

98. ManageEngine Free Windows Tools 2

The ‘Free Windows Tools 2’ kit contains a set of free Windows tools for Network Administrators, including the Remote Task Manager Tool, Wake on LAN, Software Inventory Tool, Remote Command Prompt Tool, GPO Update, Shutdown/Restart Tool, Join/Unjoin Computer Tool, Currently Logged On User, Hard Disk Space Detector Tool, Local Users/Groups List Tool, Network Share Browser Tool, and Laptop Battery Power Monitor Tool.

http://www.manageengine.com/products/free-windows-tools/download.html

99. Axence NetTools Pro

NetTools Pro is a set of tools that network administrators can use for monitoring, network scanning, security and administration.

http://www.axencesoftware.com/index.php?action=NTPro

100. Free IP Tools

Free IP Tools is a collection of common tools used to troubleshoot network applications and services in a single interface. It includes tools such as PortScan, TraceRoute, Shares, SNMPAudit, etc.

http://www.all-nettools.com/network-utilities-28/free-ip-tools-48453.htm

WebSploit Is An Open Source Project For Scan And Analysis Remote System From Vulnerability

Description :
[+]Autopwn – Used From Metasploit For Scan and Exploit Target Service
[+]wmap – Scan,Crawler Target Used From Metasploit wmap plugin
[+]format infector – inject reverse & bind payload into file format
[+]phpmyadmin – Search Target phpmyadmin login page
[+]lfi – Scan,Bypass local file inclusion Vulnerability & can be bypass some WAF
[+]apache users – search server username directory (if use from apache webserver)
[+]Dir Bruter – brute target directory with wordlist
[+]admin finder – search admin & login page of target
[+]MLITM Attack – Man Left In The Middle, XSS Phishing Attacks
[+]MITM – Man In The Middle Attack
[+]Java Applet Attack – Java Signed Applet Attack
[+]MFOD Attack Vector – Middle Finger Of Doom Attack Vector
[+]USB Infection Attack – Create Executable Backdoor For Infect USB For Windows

About Author :

Founder : Bl4ck.Viper (Fardin Allahverdinajhand)
Location : Iran – Azarbaycan

Microsoft Network Monitor
Microsoft Network Monitor is a network protocol analyzer that lets you capture, view, and analyze network traffic. Version 3.3 of Network Monitor is available in 32- and 64-bit versions. Download it now.

Microsoft Baseline Security Analyzer
The Microsoft Baseline Security Analyzer (MBSA) is an easy-to-use tool designed to help administrators of small and medium-sized businesses ensure that their Windows-based computers are secure. You can use MBSA to determine the security state of your computers in accordance with Microsoft security recommendations. MBSA also offers specific remedia¬tion guidance for security problems it detects, such as misconfigurations and missing security updates.
At the time of writing this, the current version was MBSA 2.1. This version is available in 32- and 64-bit versions, but it does not install on Windows 7. A new version that supports Windows 7 is due to be released sometime in the future. You can download the current version and get information regarding the a version for Windows 7 at microsoft.com/mbsa/.

Microsoft IPsec Diagnostic Tool
The Microsoft IPsec Diagnostic Tool helps network administrators troubleshoot network-related failures, focusing primarily on Internet Protocol security (IPsec).The tool checks for common network problems on the host machine and, if it finds any problems, it suggests re¬pair commands. The tool also collects IPsec policy information on the system and parses the IPsec logs to try to determine why the failure might have happened. The tool also provides trace collection for virtual private network (VPN) connections, the Network Ac¬cess Protection (NAP) client, Windows Firewall, Group Policy updates, and wireless and system events. The diagnostic report generated by the tool is derived from the system logs collected by the tool during its analysis phase. Download it now.

Windows Sysinternals Suite
The Windows Sysinternals Suite is a set of advanced tools for troubleshooting issues with Windows-based computers. These tools were originally developed by Winternals Software LP, which Microsoft acquired in 2006. Some of the useful and popular tools included in this suite are:

  • Autoruns This tool lets you see what programs are configured to start up automati¬cally when your system boots. It also displays the full list of registry and file locations where applications can configure autostart settings.
  • BgInfo This tool automatically generates desktop backgrounds that include important information about the system, including IP addresses, computer name, network adapt¬ers, and more.
  • Process Explorer This tool lets you find out what files, registry keys, and other objects that your processes have open, which dynamic-link libraries (DLLs) they have loaded, and who owns each process.
  • Process Monitor This tool lets you monitor the file system, registry, process, thread, and DLL activity on your computer in real time.
  • PsTools This set of command-line tools can be used for listing the processes running on local or remote computers, running processes remotely, rebooting computers, dumping event logs, and performing other tasks.
  • RootkitRevealer This tool lets you scan your system for rootkit-based malware.
  • ShellRunas This tool allows you to launch programs as a different user using a shell context-menu entry.
  • TCPView This tool lets you view active sockets on the computer in real time.

Download the entire Sysinternals Suite now.