TurboX2 is a client for the XMMS2 music player that exploits all the possibilities of the Web 2.0 buzzword. It allows for complete manipulation of the active playlist, and browsing of the Media Library from one dynamically generated page. TurboX2 also has up to the second playback information,...
|License: Freeware||Size: 68.61 KB||Download (78): TurboX2 Download|
Grenzgaenger is a Socks like hacker tool for tunneling nmap, netcat and exploits transparently through systems into protected networks. THC-Grenzgaenger tool is in ALPHA state! Please dont use it for anything illegal. Just play around with it, and it would be nice if you would give me...
|License: Freeware||Size: 14.34 KB||Download (95): THC-Grenzgaenger Download|
PC Tools Firewall Plus is a powerful personal firewall for Windows that protects your computer from intruders and controls the network traffic in and out of your PC. By monitoring applications that connect to the network Firewall Plus can stop Trojans, backdoors, keyloggers and other malware from...
|License: Freeware||Size: 2.11 MB||Download (215): PC Tools Firewall Plus Download|
Usually when infected with Vundo the user is bombarded with popups for WinFixer, Amaena, WinAntiVirus, ErrorSafe, SystemDoctor and DriveCleaner.
Generally an updated version is released once a week and in some special cases sometimes 2 or 3 times in a week. The tool has had great success...
|License: Freeware||Size: 5.91 MB||Download (279): VundoFix Download|
Colonist is a meta-distribution that exploits existing live CD Linux distributions by adapting them to the coLinux platform. Due to their optimized structure and package selections, live CD Linux distributions are very convenient to fulfill the pre-built root partition image requirement of...
|License: Freeware||Size: 512 KB||Download (81): Colonist Download|
Email Security through Procmail (the Procmail Sanitizer) provides methods to sanitize email, removing obvious exploit attempts and disabling the channels through which exploits are delivered. Email Security through Procmail also provides facilities for detecting and blocking Trojan Horse...
|License: Freeware||Size: 97.28 KB||Download (75): Email Security through Procmail Download|
SpyBye is a tool to help web masters determine if their Web pages are hosting browser exploits that can infect visiting users with malware. The project functions as an HTTP proxy server and intercepts all browser requests. A few simple rules are used to determine if embedded links on your Web...
|License: Freeware||Size: 122.88 KB||Download (78): SpyBye Download|
HAVEGE (HArdware Volatile Entropy Gathering and Expansion) is a user-level software unpredictable random number generator for general-purpose computers that exploits these modifications of the internal volatile hardware states as a source of uncertainty. During an initialization phase, the...
|License: Freeware||Size: 317.44 KB||Download (84): HAVEGE Download|
LibExploit is a generic exploit creation library. LibExploit helps the security community when writing exploits to test a vulnerability. Using the API you can write buffer overflows (stack/heap/remote/local) and format strings very easy and fast..
|License: Freeware||Size: 75.78 KB||Download (594): LibExploit Download|
Python milter module provides a python interface to Sendmails libmilter that exploits all its features. Milters can run on the same machine as sendmail, or another machine. The milter can even run with a different operating system or processor than sendmail. Sendmail talks to the milter via a...
|License: Freeware||Size: 102.4 KB||Download (73): Python milter Download|
wssecure Application Monitor is a program for Windows that can be used to detect unknown viruses and spyware that are often installed through remote exploits and unpatched vulnerabilities. It allows the user to trust programs (processes) initially and prompts when they are modified and when new...
Platforms: Windows, Other
|License: Freeware||Size: 1.11 MB||Download (32): wssecure Application Monitor Download|
Metasploit Express is an affordable, easy-to-use penetration testing solution powered by Metasploit, the world's largest, fully tested, integrated public database of exploits.
Metasploit Express enables you to validate the strengths and weaknesses of your overall security program. It also helps...
Platforms: Windows, 2003, Windows Vista, XPX64, 2008, 7, 7x64
|License: Freeware||Download (43): Metasploit Community Download|
A project that is meand to expand the exploit library and create a broader platform with publicly available exploits, helping organizations to stay ahead of the changing threat landscape.
Metasploit Framework is a useful platform for exploit testing. It allows network security professionals to...
Platforms: Windows, XP, 2003, Windows Vista, XPX64, 2008, 7, 7x64
|License: Freeware||Download (35): Metasploit Framework Download|
The library currently consists of an implementation of collision detection of static/moving ellipsoids that exploits frame-coherence using separating planes. Please visit http://www.cs.hku.hk/GraphicsGroup/cd.html for paper references.
Platforms: Windows, Mac, BSD, Linux
|License: Freeware||Size: 5.09 KB||Download (28): Ellipsoids(Quadrics) Collision Detection Download|
Molle is a cross-platform prover for modal logic, which exploits the modal semantic tableaux method. It features a very usable graphical interface, with interactive representation of generated models. Molle is maintained by Politecnico di Milano.
Platforms: Windows, Mac, Linux
|License: Freeware||Size: 2.17 MB||Download (31): Molle Download|
MCS is a tool that exploits the Monte Carlo method and, with a complex algorithm based on the PERT (Program Evaluation and Review Technique), it estimates a project's time.
MCS is a opensource project and it was devolped by Java Programming Language.
Platforms: Windows, Mac, Linux
|License: Freeware||Size: 2.2 MB||Download (33): Monte Carlo Simulations Download|
SSRLSWAM is a combination of SSRLS and stochastic gradient method .It exploits the concept of forgetting factor d?TÂ¬ that may be required due to model uncertainty, presence of unknown external disturbances, time-varying nature of observed signal or Non-stationary behaviour of observation noise.
|License: Freeware||Size: 10 KB||Download (18): Steady State RLS with Adaptive memory Download|
This is a learning model for matrix-based data. It can be more efficient than standard vector-based models when the training sample is small or the inputs are matrices, since this model has less parameters than standard ones and exploits an inner structure of the inputs. This model can be...
|License: Freeware||Size: 10 KB||Download (18): Linear matrix-based neural network Download|
Copernic Desktop Search is a popular free desktop search tool that searches Microsoft Word, Excel, and PowerPoint files, Acrobat PDFs, Outlook emails, and all popular music, picture and video formats. Copernic can also search your browser history, favourites, and contacts.Copernic Desktop Search...
|License: Freeware||Size: 10 KB||Download (19): Copernic Desktop Search functions for Matlab Download|
phPOP3clean is a PHP-based POP3 email scanner.It's designed to be run as a cron job every minute or so, and to catch & delete several types of unwanted emails:a) malformed emails - incomplete or malformed headers, which cause some POP3 servers to drop connection when the message is retrievedb)...
|License: Freeware||Size: 81.92 KB||Download (20): phPOP3clean for Email System Utilities Download|