Freeware Listing: Exploits

This program will try to recover passwords from shared resources on Windows Network Neighborhood. It exploits a bug known as "Share Level Password Vulnerability" in Windows 9x/ME. This exploit lets you gain access to shares only knowing the first character of the password. It does not work on Win9x/ME systems that are patched, and it won't work on NT-based systems such as Windows 2000 or XP as they use user level shares..

  • Platform: Win2000, Windows Server, WinOther

PC Tools Firewall Plus is a powerful personal firewall for Windows that protects your computer from intruders and controls the network traffic in and out of your PC. By monitoring applications that connect to the network Firewall Plus can stop Trojans, backdoors, keyloggers and other malware from damaging your computer and stealing your private information. PC Tools Firewall Plus is advanced technology designed specially for people, not experts. Powerful prevention against attacks and known exploits is activated by default and advanced users can also easily create their own packet filtering rules to customize the network defenses.

  • Publisher: PC Tools
  • Date: 19-01-2007
  • Size: 2160 KB
  • Platform: Win2000, Windows Server, WinOther

W32.Welchia.Worm Removal Tool - FREE - W32.Welchia.Worm is a worm that exploits multiple vulnerabilities, including:- The DCOM RPC vulnerability (described in Microsoft Security Bulletin MS03-026) using TCP port 135. The worm specifically targets Windows XP machines using this exploit. - The WebDav vulnerability (described in Microsoft Security Bulletin MS03-007) using TCP port 80. The worm specifically targets machines running Microsoft IIS 5.0 using this exploit. IIS 5.0 will most likely be found on Windows 2000 systems.W32.Welchia.Worm does the following:- Attempts to download the DCOM RPC patch from Microsoft's Windows Update Web site, install it, and then reboot the computer.

  • Platform: WinOther

Ensures safety when browsing internet Browser Defender was designed to be a toolbar for IE that will allow you to surf safely by displaying site ratings as you browse the Internet. When you visit a site its address will be checked by our servers and a rating shown in toolbar based on any malicious behavior or threats we have found associated with the site.The toolbar also integrates with the search results provided by popular search engines such as Google and Yahoo! so you can see if it is safe to continue before you visit a site.Please note information about the sites you visit will be transmitted to our servers to provide the site ratings.

  • Platform: Win2000, WinOther, WinVista

Iconvert4you is one of the best multimedia converter tool for Windows.
It exploits the power of FFMPEG to convert, encode or decode your favorite files. With its many options, optimized for a simple and effective use, you can simply convert a wide rage of formats.
The program is updated every month to provide you the maximum level of efficence and stability that is the main feature of FFMPEG, the core of this program.
Iconvert4you is an open source project, developed by Pietrosoft. If you find a bug please report us or view the source code. We also accept donations. Iconvert4you by Pietrosoft.

  • Publisher: Pietrosoft
  • Date: 01-08-2011
  • Size: 3706 KB
  • Platform: Win2000, Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64

Computer Breaker is a network testing tool that allows networking administrators to test if a computer is vulnerable to malicious attacks. Using the Nessus scanner, computer-breaker scans the remote host and automaticaly exploits its vulnerabilities..

  • Publisher: github.com
  • Date: 08-09-2012
  • Size: 88 KB
  • Platform: Linux

The library currently consists of an implementation of collision detection of static/moving ellipsoids that exploits frame-coherence using separating planes. Please visit http://www.cs.hku.hk/GraphicsGroup/cd.html for paper references..

  • Platform: Linux, Mac OS X, Unix, WinOther

InterMezzo is a high availability file system with disconnected operation and persistent caching.It exploits existing Linux file systems as the cache and has protocols similar to Coda..

  • Platform: Linux, Unix

Hosting exploit/backdoor detection daemon.It's written in python , and uses inotify (pyinotify) to monitor file system activity.It checks files smaller then some size,compares their md5sum and hex signatures against DBs with known exploits/backdoor..

  • Platform: Linux
  • Molle
  • License: Freeware
  • Rating

Molle is a cross-platform prover for modal logic, which exploits the modal semantic tableaux method. It features a very usable graphical interface, with interactive representation of generated models. Molle is maintained by Politecnico di Milano..

  • Platform: Linux, Mac OS X, WinOther

MCS is a tool that exploits the Monte Carlo method and, with a complex algorithm based on the PERT (Program Evaluation and Review Technique), it estimates a project's time. MCS is a opensource project and it was devolped by Java Programming Language..

  • Platform: Linux, Mac OS X, WinOther
  • RCX
  • License: Freeware
  • Rating

A Proof of Concept tool that exploits race condition on a wifi network by responding to a HTTP GET request with a HTTP 301 redirect response and send the victim to any URL specified by the attacker.Supports WEP and Open networks (WPA not supported).

  • Platform: Linux

SSRLSWAM is a combination of SSRLS and stochastic gradient method . It exploits the concept of forgetting factor that may be required due to model uncertainty, presence of unknown external disturbances, time-varying nature of observed signal or Non-stationary behaviour of observation noise..

  • Platform: Matlab, Scripts

This is a learning model for matrix-based data. It can be more efficient than standard vector-based models when the training sample is small or the inputs are matrices, since this model has less parameters than standard ones and exploits an inner structure of the inputs. This model can be interpreted as linear neural network with matrix inputs. You can see theory at http://pd.hacker.lt/linear_mnn.pdf (only a draft at this time).

  • Platform: Matlab, Scripts

Copernic Desktop Search is a popular free desktop search tool that searches Microsoft Word, Excel, and PowerPoint files, Acrobat PDFs, Outlook emails, and all popular music, picture and video formats. Copernic can also search your browser history, favourites, and contacts. Copernic Desktop Search can be accessed using COM interface, and the two functions published herein are an example on how to do so. The functions are: 1 - copernicdesktopsearch 2 - cdsgetfilepath copernicdesktopsearch submits search queries to Copernic Desktop Search and retrieves results of any type (files, emails, history).

  • Platform: Matlab, Scripts

DeHinter is an enhanced file-sharing client that exploits the topology of the spontaneous communities of like-minded people to enable personalized social filtering techniques. The P2P layer is based on the Limewire Gnutella client.
DeHinter License - GNU General Public License version 2.0 (GPLv2).

  • Platform: WinOther

Network Threat Simulation Tool (NTST) will be able to effectively simulate any network security threat including worms, Trojans, spywares, & exploits. It will help in testing the effectiveness of network security devices like IDS/IPS/Firewall.
Deep - Network Threat Simulation Tool License - GNU General Public License (GPL).

  • Publisher: Ntst
  • Date:
  • Platform: WinOther

A project that is meand to expand the exploit library and create a broader platform with publicly available exploits, helping organizations to stay ahead of the changing threat landscape.

Metasploit Framework is a useful platform for exploit testing. It allows network security professionals to perform penetration tests, system administrators to verify patch installations and software developers to perform regression testing.

The Metasploit Framework enables you to:

· Distinguish real threats from false positives to speed and simplify remediation
· Prioritize penetration tests based on automated vulnerability scans
· Pinpoint exploitable vulnerabilities in networks, operating systems, Web applications and databases
· Add standard and custom exploits for...

  • Platform: Win2000, Win7 x64, Windows 7, WinOther, WinServer, WinVista, WinVista x64

wssecure Application Monitor is a program for Windows that can be used to detect unknown viruses and spyware that are often installed through remote exploits and unpatched vulnerabilities. It allows the user to trust programs (processes) initially and prompts when they are modified and when new programs run in the computer. It also contains a registry monitor to immediately notify the user when new programs get added to the start up section. An add-on for wssecure can be downloaded freely from homepage that blocks new programs that are not in the trusted list from running.


.

  • Platform: Win2000, Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64

Metasploit Express is an affordable, easy-to-use penetration testing solution powered by Metasploit, the world’s largest, fully tested, integrated public database of exploits.

Metasploit Express enables you to validate the strengths and weaknesses of your overall security program. It also helps to determine the performance of your current security investments and prioritize security projects to maximize limited resources and budget.

Metasploit Express offers you a useful software solution for testing the security of your systems.

.

  • Platform: Win7 x64, Windows 7, WinOther, WinServer, WinVista, WinVista x64

Exploits: Freeware | All

New Reviews


Public PC Desktop

More and more, access to a computer and the internet is becoming easier and easier to find. Many libraries, hotels, cafes and so on may have computers available for use by the general public. However this poses a problem to administrators, that ...


Coin World

Coin world is an interesting platforming demo game in which you play as “Colin the coin” as you take on the evil “bank note flash”. The premise alone is an interesting enough reason to play the game, and combined with the ...


Ultrasurf

There are many cases where you need to access a website which is otherwise blocked by your ISP. You need to use a proxy but a using free proxy that is never easy and convincing. Also, whenever you want to hide your identity online, you need to use ...


USB Guardian

Gone are the days when Floppies, magnetic tapes and rewritable disks were used to transfer data. Nowadays, USB Flash Drives are used to transfer files. USB Flash Drives are faster, cheaper, easier and more convenient way to transfer data. Along with ...


Trillian

If you are an avid internet user, you'll be having accounts and friends all over Google, Facebook, MySpace, MSN and other such networks. With multiple accounts and probably hundreds of friends distributed over these networks, it becomes ...


Angry Birds

Angry birds is one of the most successful games of all time, despite the fact that it has been free from the very beginning. Angry birds is a experimental physics game, with the objective being to fling all of your birds into the structures occupied ...


AM Browser

AM browser is a freeware browser from 2009, which markets itself allowing you to surf the web in a more comfortable, less confusing way. Once you install and open AM browser, the first thing you will notice is how out dated the look of it is. Most ...


Jewel Quest 3 Game

Jewel quest (3) is a free ware downloadable game from Free Ride games, a game development studio with a fair number of high quality games on this website. Jewel quest isn't an exception to this rule. Jewel quest is essentially a clone of the ...


Avant Browser

There are many browsers available to download on World Wide Web, but more than 90% people use either of Chrome, Firefox or Internet Explorer. Due to this, many people either don’t know about other non-popular browsers or don’t care to ...



New Downloads

FolderMill

FolderMill monitors a folder
and automatically prints or
converts to PDF, JPG or TIFF
all new documents. Just define
...

CapturePlus

CapturePlus screen capture
software enable you to grab an
image on your computer screen,
save, print, add effects.

ScanFolder

Organizing the data in your
system can be a real pain in
the long run. Data tends to
get accumulated in every
system, ...

Advanced Uninstaller PRO

Advanced Uninstaller PRO is
the most complete uninstaller
program ever created. You can
uninstall programs completely
and ...

7Caps

7Caps is a small useful tool
that notifies you if Caps Lock
or Num Lock keys are
activated.

CommDel

The program CommDel is
designed to process a PHP
source code to remove and
recover comments. This feature
is useful if ...

MacX Free DVD to MP4
Converter for Mac

MacX Free DVD to MP4 Converter
for Mac is an innovative yet
free DVD to MP4 ripping
software for Mac users to free
...

Free File Shredder

Free File Shredder is a
virtual file shredder that
completely shreds the unwanted
files or folders from your
computer in ...

CL Searcher

CL Searcher is free Excel app
that scans Craigslist for
emails, phone #'s and any
specific text you may want to
find.



Related Searches

Url Exploits
Listing Exploits