SAINT® 7.1.1 Released
SAINT is the Security Administrator’s Integrated Network Tool. It is used to non-intrusively detect security vulnerabilities on any remote target, including servers, workstations, networking devices, and other types of nodes. It will also gather information such as operating system types and open ports. The SAINT graphical user interface provides access to SAINT’s data management, scan configuration, scan scheduling, and data analysis capabilities through a web browser. Different aspects of the scan results are presented in hyperlinked HTML pages, and reports on complete scan results can be generated and saved
SIFA - Secure Information Flow Analyzer
SIFA (Secure Information Flow Analyzer) uses a view-based approach to reason about the possible vulnerabilities of a system from an information security perspective.
HttpWatch v6.1.48 - HTTP viewer and debugger
HttpWatch is an HTTP viewer and debugger that integrates with IE and Firefox to provide seamless HTTP and HTTPS monitoring without leaving the browser window.
Dranzer v1.9.1 - Testing ActiveX Controls
CERT developed this open source tool so that software developers can test ActiveX controls for vulnerabilities before the software is released to the public.
A new Tools Tracker Leader at Security-Database joined today
Security-Database is very happy to announce that Maximiliano Soler has just joined us today as Tools Process Update Leader.
Maximiliano works as security consultant at an International Bank in Buenos Aires Argentina.
Max was a long time friend of our team and supplied us with many good software and utilities.
Welcome on board Maximiliano and happy hackin’
N.OUCHN CEO Security-Database
FindBugs Java Code Analyzer updated to 1.3.9
FindBugsâ„¢ is a program to find bugs in Java programs. It looks for instances of "bug patterns" --- code instances that are likely to be errors.
Sub7 (SubSeven) is back with a new release 2.3
Sub7, or SubSeven or Sub7Server, is the name of a popular backdoor program. It is mainly used for causing mischief, such as hiding the computer cursor, changing system settings or loading up pornographic websites. However, it can also be used for more serious criminal applications, such as stealing passwords and credit card details. Its name was derived by spelling NetBus backwards ("suBteN") and swapping "ten" with "seven".
Websecurify updated to v0.3rc1
Websecurify Security Testing Framework identifies web security vulnerabilities by using advanced browser automation, discovery and fuzzing technologies. The framework is written in JavaScript and successfully executes in numerous platforms including modern browsers with support for HTML5, xulrunner, xpcshell, Java, V8 and others.
SAINT® 7.1 Released
SAINT is the Security Administrator’s Integrated Network Tool. It is used to non-intrusively detect security vulnerabilities on any remote target, including servers, workstations, networking devices, and other types of nodes. It will also gather information such as operating system types and open ports. The SAINT graphical user interface provides access to SAINT’s data management, scan configuration, scan scheduling, and data analysis capabilities through a web browser. Different aspects of the scan results are presented in hyperlinked HTML pages, and reports on complete scan results can be generated and save
Sandcat version 3.8 released
Sandcat allows web administrators to perform aggressive and comprehensive scans of an organization’s web server to isolate vulnerabilities and identify security holes. The Sandcat scanner requires basic inputs such as host names, start URLs and port numbers to scan a complete web site and test all the web applications for security vulnerabilities
Acunetix Build v6.5.20090813 available
Acunetix Web Vulnerability Scanner (WVS) is an automated web application security testing tool that audits your web applications by checking for exploitable hacking vulnerabilities. Automated scans may be supplemented and cross-checked with the variety of manual tools to allow for comprehensive web site and web application penetration testing.