3proxy-win32|0.7.1.2|Tiny free proxy server.|http://3proxy.ru/ atstaketools|0.1|This is an archive of various @Stake tools that help perform vulnerability scanning and analysis, information gathering, password auditing, and forensics.|http://packetstormsecurity.com/files/50718/AtStakeTools.zip.html brutus|2|One of the fastest, most flexible remote password crackers you can get your hands on.|http://www.hoobie.net/brutus/ chrome-decode|0.1|Chrome web browser decoder tool that demonstrates recovering passwords.|http://packetstormsecurity.com/files/119153/Chrome-Web-Browser-Decoder.html chromensics|1.0|A Google chrome forensics tool.|https://sourceforge.net/projects/chromensics/ dark-dork-searcher|1.0|Dark-Dork Searcher.|http://rafale.org/~mattoufoutu/darkc0de.com/c0de/c/ directorytraversalscan|1.0.1.0|Detect directory traversal vulnerabilities in HTTP servers and web applications.|http://sourceforge.net/projects/httpdirscan/ dumpacl|0.0|Dumps NTs ACLs and audit settings.|http://www.systemtools.com/cgi-bin/download.pl?DumpAcl fport|2.0|Identify unknown open ports and their associated applications.|http://www.foundstone.com/us/resources/proddesc/fport.htm fuzztalk|1.0.0.0|An XML driven fuzz testing framework that emphasizes easy extensibility and reusability.|https://code.google.com/p/fuzztalk gtalk-decode|0.1|Google Talk decoder tool that demonstrates recovering passwords from accounts.|http://packetstormsecurity.com/files/119154/Google-Talk-Decoder.html handle|0.0|An small application designed to analyze your system searching for global objects related to running proccess and display information for every found object, like tokens, semaphores, ports, files,..|http://www.tarasco.org/security/handle/index.html hookanalyser|3.1|A hook tool which can be potentially helpful in reversing applications and analyzing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer.|http://hookanalyser.blogspot.de/ httpbog|1.0.0.0|A slow HTTP denial-of-service tool that works similarly to other attacks, but rather than leveraging request headers or POST data Bog consumes sockets by slowly reading responses.|http://sourceforge.net/projects/httpbog/ httprint-win32|301|A web server fingerprinting tool (Windows binaries).|http://net-square.com/httprint hyperion|1.2|A runtime encrypter for 32-bit portable executables.|http://nullsecurity.net/tools/binary.html ikeprobe|0.1|Determine vulnerabilities in the PSK implementation of the VPN server.|http://www.ernw.de/download/ikeprobe.zip intercepter-ng|0.9.10|A next generation sniffer including a lot of features: capturing passwords/hashes, sniffing chat messages, performing man-in-the-middle attacks, etc.|http://sniff.su/download.html klogger|1.0|A keystroke logger for the NT-series of Windows.|http://ntsecurity.nu/toolbox/klogger/ malwareanalyser|3.3|A freeware tool to perform static and dynamic analysis on malware.|http://malwareanalyser.blogspot.de/2011/10/malware-analyser.html mbenum|1.5.0|Queries the master browser for whatever information it has registered.|http://www.cqure.net/wp/mbenum/ mimikatz|2.1.0_alpha_20160606.1|A little tool to play with Windows security.|https://github.com/gentilkiwi/mimikatz msvpwn|65.328921b|Bypass Windows' authentication via binary patching.|https://bitbucket.org/mrabault/msvpwn nbtenum|3.3|A utility for Windows that can be used to enumerate NetBIOS information from one host or a range of hosts.|http://reedarvin.thearvins.com/ nishang|0.5.0|Using PowerShell for Penetration Testing.|https://code.google.com/p/nishang/ ntds-decode|0.1|This application dumps LM and NTLM hashes from active accounts stored in an Active Directory database.|http://packetstormsecurity.com/files/121543/NTDS-Hash-Decoder.b.html orakelcrackert|1.00|This tool can crack passwords which are encrypted using Oracle's latest SHA1 based password protection algorithm.|http://freeworld.thc.org/thc-orakelcrackert11g/ pextractor|0.18b|A forensics tool that can extract all files from an executable file created by a joiner or similar.|http://packetstormsecurity.com/files/62977/PExtractor_v0.18b_binary_and_src.rar.html php-vulnerability-hunter|1.4.0.20|An whitebox fuzz testing tool capable of detected several classes of vulnerabilities in PHP web applications.|https://phpvulnhunter.codeplex.com/ pmap|1.10|Passively discover, scan, and fingerprint link-local peers by the background noise they generate (i.e. their broadcast and multicast traffic).|http://www.hellfiresecurity.com/tools.htm pstoreview|1.0|Lists the contents of the Protected Storage.|http://www.ntsecurity.nu/toolbox/pstoreview/ pwdump|7.1|Extracts the binary SAM and SYSTEM file from the filesystem and then the hashes.|http://www.tarasco.org/security/pwdump_7/index.html radiography|2|A forensic tool which grabs as much information as possible from a Windows system.|http://www.security-projects.com/?RadioGraPhy rpcsniffer|7.9fab095|Sniffs WINDOWS RPC messages in a given RPC server process.|https://github.com/AdiKo/RPCSniffer sipscan|0.1|A sip scanner.|http://www.hackingvoip.com/sec_tools.html skype-dump|0.1|This is a tool that demonstrates dumping MD5 password hashes from the configuration file in Skype.|http://packetstormsecurity.com/files/119155/Skype-Hash-Dumper.0.html smbrelay|3|SMB / HTTP to SMB replay attack toolkit.|http://www.tarasco.org/security/smbrelay/ snscan|1.05|A Windows based SNMP detection utility that can quickly and accurately identify SNMP enabled devices on a network.|http://www.mcafee.com/uk/downloads/free-tools/snscan.aspx spade|114|A general-purpose Internet utility package, with some extra features to help in tracing the source of spam and other forms of Internet harassment.|http://www.hoobie.net/brutus/ sqlping|4|SQL Server scanning tool that also checks for weak passwords using wordlists.|http://www.sqlsecurity.com/downloads superscan|4.1|Powerful TCP port scanner, pinger, resolver.|http://www.foundstone.com/us/resources/proddesc/superscan.htm sysinternals-suite|1.8|Sysinternals tools suite.|http://sysinternals.com/ unsecure|1.2|Bruteforces network login masks.|http://www.sniperx.net/ upnp-pentest-toolkit|1.1|UPnP Pentest Toolkit for Windows.|https://github.com/nccgroup/UPnP-Pentest-Toolkit wifichannelmonitor|1.42|A utility for Windows that captures wifi traffic on the channel you choose, using Microsoft Network Monitor capture driver.|https://github.com/gentilkiwi/wifichannelmonitor windows-privesc-check|181.9f304fd|Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems.|https://github.com/pentestmonkey/windows-privesc-check winfo|2.0|Uses null sessions to remotely try to retrieve lists of and information about user accounts, workstation/interdomain/server trust accounts, shares (also hidden), sessions, logged in users, and password/lockout policy, from Windows NT/2000/XP.|http://www.ntsecurity.nu/toolbox/winfo/ x-scan|3.3|A general network vulnerabilities scanner for scanning network vulnerabilities for specific IP address scope or stand-alone computer by multi-threading method, plug-ins are supportable.|http://www.xfocus.org/