Software Listing: Penetration Testing

Metasploit Express enables IT professionals to easily verify whether vulnerabilities are exploitable, prioritize their mitigation and conduct basic penetration testing. It adds a graphical user interface to the Metasploit Framework, the de-facto leader in pentesting tools, and automates many of the tasks that otherwise require custom scripting, such as smart brute forcing, evidence collection, and reporting. With Metasploit Express, IT staff can carry out discovery, penetration testing, evidence collection and cleanup to verify system security and compliance in-between third-party audits. Metasploit Express integrates with NeXpose vulnerability management solutions to deliver precise and actionable risk scoring.

  • Platform: Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64

A test framework for penetration testing Java classes and methods with randomized parameters and testing the results.
JUnit-Penetration License - GNU Library or Lesser General Public License (LGPL).

  • Platform: WinOther

Metasploit Express is an affordable, easy-to-use penetration testing solution powered by Metasploit, the world’s largest, fully tested, integrated public database of exploits.

Metasploit Express enables you to validate the strengths and weaknesses of your overall security program. It also helps to determine the performance of your current security investments and prioritize security projects to maximize limited resources and budget.

Metasploit Express offers you a useful software solution for testing the security of your systems.

.

  • Platform: Win7 x64, Windows 7, WinOther, WinServer, WinVista, WinVista x64

Real-time display of PC system, processes and performance information. Packet decode, active process matrix, in and outbound packet matrix, socket status, drive space status, IP address, computer name, OS, date and time clock. Gauges show packets per second, % CPU, connections, active processes and % physical and virtual memory. Background is a choice of two real-time revolving pictures of Earth from space showing major cities and local times.. Karalon IQ Solutions | Network Security Assessment | Vulnerability Assessment | Vulnerability Scanner | Network Security Scanner | Security Assessment | Internet Security.

  • Publisher: karalon
  • Date: 25-07-2009
  • Size: 1873 KB
  • Platform: Win2000, WinOther

Pangolin is an automatic SQL injection penetration testing (Pen-testing) tool for Website manager or IT Security analyst. Its goal is to detect and take advantage of SQL injection vulnerabilities on web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or users specific DBMS tables/columns, run his own SQL statement, read specific files on the file system and more.

  • Publisher: NOSEC
  • Date: 01-09-2010
  • Size: 9697 KB
  • Platform: Win2000, Windows Server, WinOther

A collaboration between the open source community and Rapid7, Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments, providing true security risk intelligence. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in consolidated reports. Metasploit editions range from a free edition to professional enterprise editions, all based on the Metasploit Framework, an open source software development kit with the world's largest, public collection of quality-assured exploits.

  • Publisher: Rapid7 LLC
  • Date: 25-11-2012
  • Size: 250767 KB
  • Platform: WinOther
  • Holynix
  • License: Freeware
  • Price: 0.00
  • Rating

Similar to the de-ice pentest CDs and pWnOS, Holynix is an Linux vmware image that was deliberately built to have security holes for the purposes of penetration testing. Visit http://forums.pynstrom.net for help setting up or completing the challenge.

  • Platform: WinOther

tgcd is a simple Unix network utility to extend the accessibility of TCP/IP based network services beyond firewalls. This can also be used by network analysts and security experts for penetration testing and analyze the security of their network..

  • Platform: Linux, Unix

Enables a user to view & alter all aspects of comunications with a web site via a proxy. Primarily used for security based penetration testing of web sites, it can also be used for debugging during development. Seen as part of a hacker toolkit..

  • Platform: Linux, Mac OS X, WinOther

WS-Attacker is a modular framework for web services penetration testing. It is a free and easy to use software solution, which provides an all-in-one security checking interface with only a few clicks..

  • Platform: Linux, Mac OS X, WinOther
  • Pwnlab
  • License: Freeware
  • Price: 0.00
  • Rating

Pwnlab is a self-contained penetration-testing tutorial and lab for students and practitioners of information security, and for software developers. It combines original tutorials, real-world security tools, and virtual "victim" machines.
Pwnlab License - Apache License V2.0; BSD License; GNU General Public License (GPL); Mozilla Public License 1.0 (MPL).

  • Platform: WinOther
  • Malagor
  • License: Freeware
  • Price: 0.00
  • Rating

Goal is to enhance: security evaluation methods, methods of search for vulnerabilities in security policy of perimeter defenses, improvement of the control mechanism and full automation of penetration testing process.
Malagor License - GNU General Public License (GPL).

  • Platform: WinOther
  • SENTINIX
  • License: Freeware
  • Price: 0.00
  • Rating

SENTINIX is a GNU/Linux distribution designed for monitoring, intrusion detection, penetration testing, auditing, statistics/graphing and anti-spam. It's completely free; free to use, free to modify and free to redistribute.
SENTINIX License - GNU General Public License version 2.0 (GPLv2).

  • Platform: WinOther

Sistema Operacional voltado para penetration testing.
Bitix O.S License - GNU General Public License (GPL).

  • Platform: WinOther

THP is a vulnerability assessment and penetration testing framework and CLI. It's aim is to help the security professional in it's everyday work.
THP Project License - GNU General Public License (GPL).

  • Publisher: Ush
  • Date:
  • Platform: WinOther

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.

It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing.

ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.

Features:

Intercepting Proxy
Automated scanner
Passive scanner
Brute Force scanner
Spider
Fuzzer
Port scanner
Dynamic SSL certificates
API
Beanshell integration.

  • Platform: Windows 7, WinOther, WinVista

Element53 is a ready-to-use DNS-tunnel for Android. It can be used for penetration testing (other uses are not supported).
Element53 creates a TCP-tunnel to a SOCKS proxy server. The client side of the tunnel is localhost:3128. For your convenience the server part is provided.
If you have rooted your device (this is no requirement) you can install ProxyDroid and route all internet traffic into the tunnel.

If you encounter a bug or problem, please contact the developer before leaving a bad rating or review.

If you are using the provided server, note that we are not logging any of your traffic.

  • Platform: Android 2.x, Android 3.x, Android 4.4, Android 4.x

PenTest Tools is a list of android apps for penetration testing.

IT IS JUST A LIST, DON'T EXPECT ANYTHING MORE THAN THAT (sorry for all caps, but some people expect matrix meets mission impossible... and give a bad rating when their expectations are not met :) )

Please read the description...

Penetration test is used to test security of something. (if that something passes penetration test, there is a higher chance that hacker cant hack into it)

Apps are sorted with Tags.

Features:
Links to Apps on the Play Store.
Links to Apps that are NOT on the Play Store
Links to Source Code of Open Source Apps
Links to App websites.

  • Platform: Android 1.x, Android 2.x, Android 3.x, Android 4.4, Android 4.x
  • DoSHTTP
  • License: Shareware
  • Price: 14.99
  • Rating

DoSHTTP is an easy to use and powerful HTTP Flood Denial of Service (DoS) Testing Tool for Windows. DoSHTTP includes URL Verification, HTTP Redirection and performance monitoring. DoSHTTP uses multiple asynchronous sockets to perform an effective HTTP Flood. DoSHTTP can be used simultaneously on multiple clients to emulate a Distributed Denial of Service (DDoS) attack. DoSHTTP can help IT Professionals test web server performance and evaluate protection software. DoS-HTTP was developed by certified IT Security and Software Development professionals..

  • Platform: Win2000, Windows Server, Windows Vista, WinOther

ike-scan - IPsec VPN scanning, fingerprinting and testing tool ike-scan is a command-line tool that uses the IKE protocol to fingerprint, discover, and test IPsec VPN servers.ike-scan will allow you to easily inpout the outgoing IKE packet and will automatically decode the response packets. ike-scan also supports the pre-shared key cracking for IKE aggressive mode using the pre-shared key authentication.. NTA Monitor - Welcome. NTA - your leading IT security consultancy.

  • Platform: WinOther

Page: 1 | 2 | 3 | 4 | 5 | Freeware

New Reviews


Norton Internet Security Beta

Due to growing number of cyber-attacks, need of secure computers and networks has increased dramatically. Therefore, new protection technologies are being introduced every day and are incorporated into different products. This has led to evolution ...


Funny Photo Maker

It happens a lot of times that you capture a photograph, it is good enough but you still want to play with it and improve it. There are lots of programs available for photo editing and some might say that you should use Adobe’s Photoshop. Yes, ...


Flower Power

Flower power is a freeware puzzle game which is very similar in gameplay style and nature to the classic arcade game bejeweled, taking all the basic concept, idea and gameplay from bejeweled, and adding its own twist in the form of the art style of ...


FILExtinguisher

FILExtinguisher is a simplistic looking data removal tool, that will assist you in totally and completely removing sensitive data from your computer hard drive. This means that you can securely remove your online surfing history, banking details, ...


Arctic Quest Game

Arctic  quest game (referred to in game as simply arctic quest) is a free ware downloadable game by free ride games, a game development website with a variety of games also downloadable from this site. Arctic quest is a very interesting puzzle ...


Public PC Desktop

More and more, access to a computer and the internet is becoming easier and easier to find. Many libraries, hotels, cafes and so on may have computers available for use by the general public. However this poses a problem to administrators, that ...


Battle of Britain

Battle of Britain is a top down strategy and shooter game that takes place during the historic battle of Britain, as the name would suggest. The game takes place from a top down perspective, and has a fairly interesting method of control. Instead of ...


Simple Sticky Notes

Simple sticky notes is a freeware note taking utility to appeal to users in the same way in which a physical sticky note would; by allowing you to write something down very quickly with very little effort (without having to open a program or pull ...


AM Browser

AM browser is a freeware browser from 2009, which markets itself allowing you to surf the web in a more comfortable, less confusing way. Once you install and open AM browser, the first thing you will notice is how out dated the look of it is. Most ...



New Downloads

KillDisk Desktop

Permanently delete all digital
data with this highly
customizable hardware-based
digital shredder.
Automatically erase up ...

Vehicle Fleet Manager

Designed to service large
fleets, small fleets, and
everything in between, our
fleet management solution will
track ...

Paradox Direct Engine
(ActiveX)

This engine allow to read and
load the external Paradox
tables into any MS Jet/ADO
datasource No any external
...

PrintForm

Printform 2017 is a software
that enables you to process
and manage more than 2400
building processing forms.
Plenty ...

SmartCallMonitor

SmartCallMonitor is the
easy-to-use calling and
monitoring software for TAPI
capable hardware like a
telephone system or ...

LoneColor for Android

Set an instant beautiful color
wallpapers on your smartphone
or tablet. An infinite palette
with one tap! Try a ...

Phototheca

Phototheca lets you manage
your photos in different ways
like Events, Albums, Smart
Albums, Calendar, Timeline and
...

PDF Imposition DE

PDF Imposition DE software
software automates the process
of 2up\'ing or 4up\'ing a pdf
document

Tibet Free Screensaver

Tibet is a mysterious area in
Central Asia. It is the
highest region on Earth and is
commonly referred to as the
"Roof of ...



Related Searches

Testing Crc
Testing Beta
Testing Bootp
Clerical Aptitude Testing
Testing Configurations
Vce Testing
VCE Testing System
Vce Testing Manager
VoIP Testing
Volume Testing
Pressuremeter Testing
Qpack Free Testing Tool Test Management