Freeware Listing: Exploits
- Shared Resource Password Recovery
- License: Freeware

This program will try to recover passwords from shared resources on Windows Network Neighborhood. It exploits a bug known as "Share Level Password Vulnerability" in Windows 9x/ME. This exploit lets you gain access to shares only knowing the first character of the password. It does not work on Win9x/ME systems that are patched, and it won't work on NT-based systems such as Windows 2000 or XP as they use user level shares..
- Publisher: den fete gjengen
- Date: 14-06-2005
- Size: 204 KB
- Platform: Win2000, Windows Server, WinOther
- PC Tools Firewall Plus
- License: Freeware

PC Tools Firewall Plus is a powerful personal firewall for Windows that protects your computer from intruders and controls the network traffic in and out of your PC. By monitoring applications that connect to the network Firewall Plus can stop Trojans, backdoors, keyloggers and other malware from damaging your computer and stealing your private information. PC Tools Firewall Plus is advanced technology designed specially for people, not experts. Powerful prevention against attacks and known exploits is activated by default and advanced users can also easily create their own packet filtering rules to customize the network defenses.
- Publisher: PC Tools
- Date: 19-01-2007
- Size: 2160 KB
- Platform: Win2000, Windows Server, WinOther
- WWelchiaWorm Removal Tool
- License: Freeware

W32.Welchia.Worm Removal Tool - FREE - W32.Welchia.Worm is a worm that exploits multiple vulnerabilities, including:- The DCOM RPC vulnerability (described in Microsoft Security Bulletin MS03-026) using TCP port 135. The worm specifically targets Windows XP machines using this exploit. - The WebDav vulnerability (described in Microsoft Security Bulletin MS03-007) using TCP port 80. The worm specifically targets machines running Microsoft IIS 5.0 using this exploit. IIS 5.0 will most likely be found on Windows 2000 systems.W32.Welchia.Worm does the following:- Attempts to download the DCOM RPC patch from Microsoft's Windows Update Web site, install it, and then reboot the computer.
- Publisher: symantec.com
- Date: 16-9-2009
- Size: 171 KB
- Platform: WinOther
- Browser Defender
- License: Freeware

Ensures safety when browsing internet Browser Defender was designed to be a toolbar for IE that will allow you to surf safely by displaying site ratings as you browse the Internet. When you visit a site its address will be checked by our servers and a rating shown in toolbar based on any malicious behavior or threats we have found associated with the site.The toolbar also integrates with the search results provided by popular search engines such as Google and Yahoo! so you can see if it is safe to continue before you visit a site.Please note information about the sites you visit will be transmitted to our servers to provide the site ratings.
- Publisher: browserdefender.com
- Date: 25-9-2009
- Size: 582 KB
- Platform: Win2000, WinOther, WinVista
- Iconvert4you .0 Beta
- License: Freeware

Iconvert4you is one of the best multimedia converter tool for Windows.
It exploits the power of FFMPEG to convert, encode or decode your favorite files. With its many options, optimized for a simple and effective use, you can simply convert a wide rage of formats.
The program is updated every month to provide you the maximum level of efficence and stability that is the main feature of FFMPEG, the core of this program.
Iconvert4you is an open source project, developed by Pietrosoft. If you find a bug please report us or view the source code. We also accept donations. Iconvert4you by Pietrosoft.
- Publisher: Pietrosoft
- Date: 01-08-2011
- Size: 3706 KB
- Platform: Win2000, Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64
- Computer Breaker
- License: Freeware

Computer Breaker is a network testing tool that allows networking administrators to test if a computer is vulnerable to malicious attacks. Using the Nessus scanner, computer-breaker scans the remote host and automaticaly exploits its vulnerabilities..
- Publisher: github.com
- Date: 08-09-2012
- Size: 88 KB
- Platform: Linux
- Ellipsoids(Quadrics) Collision Detection
- License: Freeware

The library currently consists of an implementation of collision detection of static/moving ellipsoids that exploits frame-coherence using separating planes. Please visit http://www.cs.hku.hk/GraphicsGroup/cd.html for paper references..
- Publisher: cdquadrics.sourceforge.net
- Date: 14-06-2012
- Size: 5 KB
- Platform: Linux, Mac OS X, Unix, WinOther
- InterMezzo
- License: Freeware

InterMezzo is a high availability file system with disconnected operation and persistent caching.It exploits existing Linux file systems as the cache and has protocols similar to Coda..
- Publisher: inter-mezzo.org
- Date: 03-06-2012
- Size: 464 KB
- Platform: Linux, Unix
- malmon
- License: Freeware

Hosting exploit/backdoor detection daemon.It's written in python , and uses inotify (pyinotify) to monitor file system activity.It checks files smaller then some size,compares their md5sum and hex signatures against DBs with known exploits/backdoor..
- Publisher: malmon.sourceforge.net
- Date: 09-06-2012
- Size: 303 KB
- Platform: Linux
- Molle
- License: Freeware

Molle is a cross-platform prover for modal logic, which exploits the modal semantic tableaux method. It features a very usable graphical interface, with interactive representation of generated models. Molle is maintained by Politecnico di Milano..
- Publisher: molle.sourceforge.net
- Date: 24-07-2012
- Size: 2219 KB
- Platform: Linux, Mac OS X, WinOther
- Monte Carlo Simulations
- License: Freeware

MCS is a tool that exploits the Monte Carlo method and, with a complex algorithm based on the PERT (Program Evaluation and Review Technique), it estimates a project's time. MCS is a opensource project and it was devolped by Java Programming Language..
- Publisher: mcsimulations.sourceforge.net
- Date: 21-11-2012
- Size: 2252 KB
- Platform: Linux, Mac OS X, WinOther
- RCX
- License: Freeware

A Proof of Concept tool that exploits race condition on a wifi network by responding to a HTTP GET request with a HTTP 301 redirect response and send the victim to any URL specified by the attacker.Supports WEP and Open networks (WPA not supported).
- Publisher: rcx.sourceforge.net
- Date: 01-07-2012
- Size: 174 KB
- Platform: Linux
- Steady State RLS with Adaptive memory
- License: Freeware

SSRLSWAM is a combination of SSRLS and stochastic gradient method . It exploits the concept of forgetting factor that may be required due to model uncertainty, presence of unknown external disturbances, time-varying nature of observed signal or Non-stationary behaviour of observation noise..
- Publisher: Ihsan Ullah
- Date: 06-03-2013
- Size: 10 KB
- Platform: Matlab, Scripts
- Linear matrix-based neural network
- License: Freeware

This is a learning model for matrix-based data. It can be more efficient than standard vector-based models when the training sample is small or the inputs are matrices, since this model has less parameters than standard ones and exploits an inner structure of the inputs. This model can be interpreted as linear neural network with matrix inputs. You can see theory at http://pd.hacker.lt/linear_mnn.pdf (only a draft at this time).
- Publisher: Povilas Daniu?is
- Date: 10-04-2013
- Size: 10 KB
- Platform: Matlab, Scripts
- Copernic Desktop Search functions for Matlab
- License: Freeware

Copernic Desktop Search is a popular free desktop search tool that searches Microsoft Word, Excel, and PowerPoint files, Acrobat PDFs, Outlook emails, and all popular music, picture and video formats. Copernic can also search your browser history, favourites, and contacts. Copernic Desktop Search can be accessed using COM interface, and the two functions published herein are an example on how to do so. The functions are: 1 - copernicdesktopsearch 2 - cdsgetfilepath copernicdesktopsearch submits search queries to Copernic Desktop Search and retrieves results of any type (files, emails, history).
- Publisher: Gianluca Dorini
- Date: 05-04-2013
- Size: 10 KB
- Platform: Matlab, Scripts
- DeHinter
- License: Freeware

DeHinter is an enhanced file-sharing client that exploits the topology of the spontaneous communities of like-minded people to enable personalized social filtering techniques. The P2P layer is based on the Limewire Gnutella client.
DeHinter License - GNU General Public License version 2.0 (GPLv2).
- Publisher: Dehinter
- Date:
- Platform: WinOther
- Deep - Network Threat Simulation Tool
- License: Freeware

Network Threat Simulation Tool (NTST) will be able to effectively simulate any network security threat including worms, Trojans, spywares, & exploits. It will help in testing the effectiveness of network security devices like IDS/IPS/Firewall.
Deep - Network Threat Simulation Tool License - GNU General Public License (GPL).
- Publisher: Ntst
- Date:
- Platform: WinOther
- Metasploit Framework
- License: Shareware

A project that is meand to expand the exploit library and create a broader platform with publicly available exploits, helping organizations to stay ahead of the changing threat landscape.
Metasploit Framework is a useful platform for exploit testing. It allows network security professionals to perform penetration tests, system administrators to verify patch installations and software developers to perform regression testing.
The Metasploit Framework enables you to:
· Distinguish real threats from false positives to speed and simplify remediation
· Prioritize penetration tests based on automated vulnerability scans
· Pinpoint exploitable vulnerabilities in networks, operating systems, Web applications and databases
· Add standard and custom exploits for...
- Publisher: Rapid7
- Date:
- Platform: Win2000, Win7 x64, Windows 7, WinOther, WinServer, WinVista, WinVista x64
- wssecure Application Monitor
- License: Shareware

wssecure Application Monitor is a program for Windows that can be used to detect unknown viruses and spyware that are often installed through remote exploits and unpatched vulnerabilities. It allows the user to trust programs (processes) initially and prompts when they are modified and when new programs run in the computer. It also contains a registry monitor to immediately notify the user when new programs get added to the start up section. An add-on for wssecure can be downloaded freely from homepage that blocks new programs that are not in the trusted list from running.
.
- Publisher: Bapuli Online
- Date:
- Size: 1136 KB
- Platform: Win2000, Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64
- Metasploit Community
- License: Shareware

Metasploit Express is an affordable, easy-to-use penetration testing solution powered by Metasploit, the world’s largest, fully tested, integrated public database of exploits.
Metasploit Express enables you to validate the strengths and weaknesses of your overall security program. It also helps to determine the performance of your current security investments and prioritize security projects to maximize limited resources and budget.
Metasploit Express offers you a useful software solution for testing the security of your systems.
.
- Publisher: Rapid7
- Date:
- Platform: Win7 x64, Windows 7, WinOther, WinServer, WinVista, WinVista x64
Exploits: Freeware | All











