Freeware Listing: Application Security

N-Stalker Web Application Security Scanner 2006 is a state-of-the-art security assessment tool developed by N-Stalker. By incorporating the well-known N-Stealth HTTP Security Scanner and its 35,000 Web Attack Signature database, along with a patent-pending Component-oriented Web Application Security Assessment technology, N-Stalker is capable of sweeping your Web Application for a large number of vulnerabilities common to this environment, including Cross-site Scripting and SQL injection, Buffer Overflow and Parameter Tampering attacks and much more..

  • Publisher: N-Stalker
  • Date: 08-09-2006
  • Size: 12426 KB
  • Platform: Win2000, Windows Server, WinOther

The first publicly released general-purpose web application security assessment tool. Achilles acts as a HTTP/HTTPS proxy that allows a user to intercept, log, and modify web traffic on the fly.

  • Platform: Win2000, WinOther, WinServer, WinVista

N-Stalker Web App Security Scanner Free Edition - enhance the overall security of your web server N-Stalker Web Application Security Scanner 2006 Free Edition is meant to replace previous available N-Stalker technology, i.e., the N-Stealth HTTP Security Scanner. It provides a free set of Web Security Assessment checks to enhance the overall security of your web server infrastructure, using the most complete web attack signature database available in the market "N-Stealth Web Attack Signature Database".Developed upon the patent-pending technology of Component-oriented Web Application Security Scanning, N-Stalker Free Edition allows for quick security assessment of Web Applications under the perspective of Infrastructure and Deployment phases.

  • Platform: WinOther
  • JSky
  • License: Freeware
  • Rating

NOSEC JSky is a website security testing tool that automates vulnerability assessments. It scan all Web application vulnerabilities including SQL-Injection and Cross-Site Scripting. NOSEC JSky is specifically designed to assess potential security flaws and to provide all the information you need to fix them. JSky delivers the latest evolution in assessment technology, a Web application security product that adapts to any enterprise environment. Internet Envirionment: The value of the corporate assets that are accessible through Web applications is growing every day. Unfortunately, so is the threat of damage and loss due to hacking.

  • Publisher: NOSEC
  • Date: 01-09-2010
  • Size: 8626 KB
  • Platform: Win2000, Win7 x32, Win7 x64, Windows Server, Windows Vista, WinOther

Agnitio is a handy, easy to use application security tool that was developed to help further the adoption of the Principles of Secure Development.

The application will also help you bring more repeatability and integrity to security code reviews.


.

  • Platform: WinOther

Event Log Extension for AnyFileBackup provides an ability to monitor application, security, system and other event logs. The notifications about events can be dispatched via LAN, email, SMS and ICQ (via e-mail gates).

The Event log extension supports events filtering by log type (Application, Security, System, etc.), type of event (Error, Warning, Information, etc.), selection by EVENTID, SOURCE, CATEGORY. It can execute external programs using events data as a command line parameters.

.

  • Platform: WinOther

Audit your website security with Acunetix Web Vulnerability Scanner As many as 70% of web sites have vulnerabilities that could lead to the theft of sensitive corporate data such as credit card information and customer lists. Hackers are concentrating their efforts on web-based applications - shopping carts, forms, login pages, dynamic content, etc. Accessible 24/7 from anywhere in the world, insecure web applications provide easy access to backend corporate databases and also allow hackers to perform illegal activities using the attacked site. A victim's website can be used to launch criminal activities such as hosting phishing sites or to transfer illicit content, while abusing the website's bandwidth and making its owner liable for these unlawful acts.

  • Publisher: Acunetix
  • Date: 29-10-2008
  • Size: 13414 KB
  • Platform: Win2000, Windows Server, Windows Vista, WinOther

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goals are to be light weight, easy to use and full of vulnerabilities to exploit. Used to learn or teach the art of web application security..

  • Publisher: dvwa.co.uk
  • Date: 17-07-2012
  • Size: 1331 KB
  • Platform: Linux, Mac OS X, WinOther

This is a set of PHP libraries that should help with writing inherently secure code. The audience is mostly developers for smaller projects (e-commerce shopping site, community sites...). For a full fledged enterprise API, look for OWASPs ESAPI.
Application Security Streetfighter Libs License - GNU Library or Lesser General Public License (LGPL).

  • Platform: WinOther

Motion Monitor is a light-weight, easy to configure security application. Just set up a web cam, or any other DirectShow compliant device, and use Motion Monitor to keep watch. As you can see in the screen shot below, Motion Monitor is easy to setup and even easier to use. Just plug in your capture device, start Motion Monitor and adjust the 5 configuration options. Then watch as Motion Monitor detects motion in each frame, and displays the motion it detects. If the motion detected is over the threshold that you configured it will save a JPEG in the /Output/ folder under the installation folder.

  • Platform: Win2000, Win7 x64, Windows 7, WinOther, WinServer, WinVista, WinVista x64

ckiwi DAI (Dirty Application Inspector) version: 1.0.06

For all applications of security rank, see which application the most rogue, DAI live it!

Pioneering professional algorithms to calculate the safety score for each application,
With it you can easily master the application security situation in the equipment, for all applications access to be clear at a glance,
Easily find the malware or malicious applications, can also convenient unloading dangerous applications.

Comprehensive application of classification list, can distinguish between applications of user manual installation, system pre-installed applications,
Pre-loaded and ingenuity can list system, the android native applications,
ROM users against a third party and fake brands of mobile phone users,
Can immediately understand what absorption was...

  • Platform: Android 2.x, Android 3.x, Android 4.4, Android 4.x

XP firewall control uses all the present abilities of the XP firewall and extends them with application level security model. XP firewall control introduces per-application named security zones and allows security zone management. Features: Complete usage of XP firewall benefits; Handy application access control on the desktop; Per-application security zones; One touch security settings for applications; Group security zone management; User-defined zones; Security zone composer;.

  • Platform: WinOther

Privacyware Dynamic Security Agent (DSA) delivers easy, immediate, signature-less protection from known or new malware and all forms of unauthorized use for Windows desktops and servers. An intelligent multi-layered defense, DSA continuously evaluates system processes, applications, WinAPI calls, registry settings and other system variables to reveal, alert, quarantine and block potentially malicious activity. DSA incorporates system and email anomaly detection components that baseline normal computer operation and detect unacceptable deviations from typical use. DSA is an ideal, zero-day defense complement to virus and spyware scanners and firewalls.

  • Publisher: Privacyware
  • Date: 05-25-2006
  • Size: 1580 KB
  • Platform: Win2000, Windows Server, WinOther

Guard Stone is an Open Source Security Platform, which enables to integrate and deploy open source security tools. Some of Guard Stone's focus areas include Firewall, VPN, Mail Gateway Filters, Web Filters, Web Application Security, Routing etc;
Open Source Security Network License - Affero GNU Public License.

  • Platform: WinOther
  • KayRa
  • License: Shareware
  • Rating

KayRa was designed to be a Web Application Auditing Tool that tests the security of your Web Site.

On a basic level of operation, KayRa will grab a specified page from a specified site and test it for the following:
- Invalid Form Data
- Cross Site Scripting Vulnerability
- SQL Injection
- Security of javascript or VBScript

It also queires the Web server and gains as much information as possible through the returned headers.

Error Page Retrieval
KayRa will try its best to cause errors on your website. The results of these errors will then be analyzed and further information will be noted.

  • Publisher: Kayra
  • Date:
  • Size: 1720 KB
  • Platform: WinOther

Computer Hackers, Identity Thieves and Hi-Tech Scam Artists are taking over the world. Everyday you hear about companies like Sony, FBI even the United States Whitehouse.

Don’t become the next victim! National Cyber Security (NationalCyberSecurity.com) for Android delivers the latest news and information as it happens 24 hours a day. With over 70 categories and 1500 news feeds from around the world, National Cyber Security covers everything from computer hacking, cell phone security, cyber bullying, events, conferences, videos, computer security job openings.

This application is for the laymen, computer geeks, students, law enforcement and fellow computer hackers.

  • Platform: Android 1.x, Android 2.x, Android 3.x, Android 4.4, Android 4.x

Metadefender Endpoint Management (MEM) leverages the OESIS Framework to verify the security and compliance posture of endpoint devices via static analysis. MEM also exposes APIs to enable third party solutions to consume and react to reported postures. Compliance checks report the status of: Encryption Password protection Operating System patch level Anti-malware protection Patch management clients Potentially unwanted applications (File sharing, toolbars, etc.) Endpoint detection & response (EDR) clients And more Security checks report indications of infection by: Reporting threats identified by locally installed anti-malware Reporting reputation of remote connections of the device And more Supported endpoint operating systems: Windows (XP - Windows 10) Windows Server (2008 - 2012 R2) OS X (10.

  • Platform: Mac OS X

dotDefender Monitor for IIS is the only way to know who is attacking your web site in real time. Residing on the web server as a software plug-in, dotDefender can be installed and implemented in minutes without influence on traffic or network architecture. dotDefender Monitor provides plug-and-play monitoring of SQL Injection, Cross-site scripting, Path Traversal, and many other application attacks. Version 3.8 enhanced configuration performance, improved comfiguration engine to enables changes in seconds..

  • Platform: Win2000, Windows Server

dotDefender Monitor for Apache is the only way to know who is attacking your web site in real time. Residing on the server as webserver plug-in, dotDefender can be installed and implemented in minutes without influence on traffic or network architecture. dotDefender Monitor provides plug-and-play monitoring of SQL Injection, Cross-site scripting, Path Traversal, and many other application attacks. Version 3.8 enhanced configuration performance, improved comfiguration engine to enables changes in seconds..

  • Platform: Linux, Unix

Burp spider is a tool for enumerating web-enabled applications enumBurp spider is a tool for enumerating web-enabled applications that uses various intelligent techniques to generate a comprehensive inventory of an application's functionality and content.Burp spider enables the user to obtain a detailed understanding of how a web application works, avoiding the time-consuming and unreliable task of manually following links, submitting forms and scouring HTML source code.Potentially vulnerable application functions can be quickly identified, allowing the user to check for specific vulnerabilities such as SQL injection and directory traversal.

  • Platform: WinOther

Application Security: Freeware | All

New Reviews


Secure Virtual Desktop

Secure Virtual Desktop is a piece of software that allows you to enter a temporary ‘Secure’ desktop state, where everything is filtered and anonymous - sounds interesting, doesn’t it? Secure Virtual Desktop is definitely something ...


Privacy Winner

Many computer users know that over time your computer slows down. Give it six months and if you’re unlucky enough, your brand new shiny Windows 7 computer will be running just as slow as your old XP one was, causing you no end of problems such ...


Norton Internet Security Beta

Due to growing number of cyber-attacks, need of secure computers and networks has increased dramatically. Therefore, new protection technologies are being introduced every day and are incorporated into different products. This has led to evolution ...


Hot Lines

Hot lines is a freeware logic based puzzle and strategy game, which is actually entirely its own game, but bares resemblance to logic game such as chess and even games such as advance wars for the portable nintendo systems. In hot lines you must ...


Ultrasurf

There are many cases where you need to access a website which is otherwise blocked by your ISP. You need to use a proxy but a using free proxy that is never easy and convincing. Also, whenever you want to hide your identity online, you need to use ...


Crash Boom Bang

Crash boom bang is a fairly interesting and unique puzzle game, which blends the elements of the pretty typical “removal” sub genre of puzzlers, with an interesting extra bit of variation added in the way the game works. This comes in ...


Avant Browser

There are many browsers available to download on World Wide Web, but more than 90% people use either of Chrome, Firefox or Internet Explorer. Due to this, many people either don’t know about other non-popular browsers or don’t care to ...


Smart Defrag 2

From right back in the early days of Windows, there has always been a disk defragmenter included as standard, called (funnily enough) Disk Defragmenter. Its changed a lot as times have moved on and Microsoft upgraded Windows. There are many ...


Clear All History

Regardless of what you do online and who you share your computer with, its always has been and always will be a good idea to clear your traces and virtual footprints left behind on your system. Not only is this good practice to help protect your ...



New Downloads

MerchanNet

Best for garment, apparel,
home textiles, necktie, socks,
footwear, household, apparel,
headwear industry, bags,
luggage ...

Warm Seas HD Screensaver

Just distract from the work
for a few minutes, sit back
and enjoy the wonderful world
of tropical seascapes created
on ...

Inquisitor

Evil does not sleep. The fight
rages on as the fires burn...
The forces of evil closed in
to conquer the land. People
...

Magic Book 3D Screensaver

Magic Book 3D Screensaver
presents a philosophic
approach to the process of
time. The book fixes the
moments of our life ...

Mp3Transformer Free

Mp3 Transformer is an amazing
streaming/converting/recording
/ tool for the music freak
that is always searching for
new ...

ByteScout Bitmap Visualizer
Addon

visual studio debugger addon
to preview Bitmap and Image
objects while debugging. Works
with Visual Studio 2005, 2008,
...

Sharest

Sharest is one of the most
easy-to-use p2p clients
around, inspired by
Limewire\'s architecture but
developed further for ...

BitComet Turbo Accelerator

BitComet Turbo Accelerator is
an effective plug-in for
BitComet P2P. The program
includes most moderntechnology
that is ...

Norton Security with Backup

Norton Security beta provides
easy, comprehensive security
no matter how you connect.
Test our latest version
against the ...



Related Searches

Sony Application Security Lock
Clients Mail Application Security
Project Plan Application Security
Web Application Security Tool
Security Application China Mobile
Internet Security Application
Application Panel Security User
Dell Security Manager Application
Fujitsu Security Application Panel
Id Bank Security Application
Security Log Book Application
Usb Disc Security Application