andycuff

Wikto is a tool that checks for flaws in webservers. It provides much the same functionality as Nikto but adds various interesting pieces of functionality, such as a Back-End miner and close Google integration. Wikto is written for the MS .NET environment ...

Category Website Scanners
Modified
Open Source
Pricing Model

WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its mo ...

Category Website Scanners
ModifiedNever
iSEC Partners, Inc.
Open Source
Pricing Model

ProxMon is an extensible Python based framework that reduces testing effort, improves consistency and reduces errors. Its use requires limited additional effort as it processes the proxy logs that you’re already generating and reports discovered issues. I ...

Category Website Scanners
Modified
Open Source
Pricing Model

The primary goal of Pantera is to combine automated capabilities with complete manual testing to get the best penetration testing results. The following are some notable Pantera Features: * User-friendly custom web GUI. (CSS): Pantera itself is a web appl ...

Category Website Scanners
Modified
WaveFront Consulting Group
Commercial
Pricing Model

This 4-day course aims to provide web application developers with an understanding of application security issues and attack vectors, and the skills necessary to code defensively against web attacks. We will show how hackers can abuse a web application, ...

Modified
Sourcefire Inc
Commercial
Pricing Model

Sourcefire Defense Center is the nerve center of the Sourcefire 3D system. Defense Center unifies critical network security functions including event monitoring, correlation, and prioritization for forensic analysis, trends analysis, and management report ...

Modified
Sourcefire Inc
Commercial
Pricing Model

Sourcefire RUA enables customers for the first time to correlate threat, endpoint, and network intelligence with user identity information---equipping them to identify the source of policy breaches, attacks, or network vulnerabilities immediately. Much mo ...

Category Host IDS
Modified
Commercial
Pricing Model

Symantec Control Compliance Suite is a comprehensive solution for compliance process automation. It allows a risk based approach to managing compliance and security, and provides a fully integrated and flexible platform for deployment. It provides the mos ...

Category Compliance
Modified
Symantec Control Compliance Suite
TrueCrypt Foundation
Open Source
Pricing Model

WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues This page exists only to help migrate existing data encrypted by TrueCrypt. The development of TrueCrypt was ended in 5/2014 after Microsoft terminated support of Windows X ...

Modified
TrueCrypt
PGP Corporation
Commercial
Pricing Model

PGP® Whole Disk Encryption provides enterprises with comprehensive, nonstop disk encryption for Microsoft and Apple Mac OS X, enabling quick, cost-effective protection for data on desktops, laptops, and removable media. The encrypted data is continuou ...

Modified
Commercial
Pricing Model

Formerly known as Geneva

Modified
Commercial
Pricing Model

The FireEye Malware Analysis System (MAS) gives threat analysts hands-on control over powerful auto-configured test environments where they can safely execute and inspect advanced malware, zero-day, and targeted APT attacks embedded in common file formats ...

ModifiedNever
FireEye MAS
Commercial
Pricing Model

McAfee Network Threat Response is a software package that captures, deconstructs, and analyzes malware that is resident inside your network today. Network Threat Response is a powerful cyber tool for security analysts. It automatically identifies malware ...

Modified
McAfee Network Threat Response
Commercial
Pricing Model

Palo Alto Networks has developed WildFire, which provides the ability to identify malicious behaviors in executable files by running them in a virtual environment and observing their behaviors. This enables Palo Alto Networks to identify malware quickly a ...

Modified
Palo Alto WildFire
Commercial
Pricing Model

NNP collects files on the wire, detects known malware and delivers payloads from unknown threats to the MAG2 for deep malware analysis. Once analysis is completed in MAG2, security teams have actionable intelligence to remediate the damage from the malwar ...

Modified
Norman Malware Analyser G2 (MAG2)
Commercial
Pricing Model

TAAS NetAnalyzer™ accurately detects diverse network transactions to predict the order and time window for malware occurrences that elude conventional IDS/IPS. The software works by identifying communication sequences which occur during an infection proce ...

Modified
TaaSERA NetAnalyzer
Commercial
Pricing Model

Damballa CSP sits out-of-band inside the service provider's network and monitors DNS requests (non-PII traffic) from the subscriber's IP address. By monitoring DNS query behavior, Damballa CSP can identify which subscriber's are infected with advanced ma ...

Modified
Damballa Communications Service Providers (CSP)
Open Source
Pricing Model

you can throw any suspicious file at it and in a matter of seconds Cuckoo will provide you back some detailed results outlining what such file did when executed inside an isolated environment. Cuckoo generates a handful of different raw data which includ ...

ModifiedNever
Cuckoo
Commercial
Pricing Model

Network Threat Behavior Analysis monitors and reports unusual network behavior by analyzing traffic from switches and routers from vendors such as Cisco, Juniper Networks, and Extreme Networks. Network Threat Behavior Analysis collects and analyzes traff ...

Modified
McAfee Network Threat Behavior Analysis (NTBA)
Commercial
Pricing Model

McAfee Global Threat Intelligence (GTI) is a comprehensive cloud-based threat intelligence service. Already integrated into McAfee security products, it works in real time, 24 hours a day, to protect customers against cyberthreats across all vectors — fil ...

Modified
McAfee Global Threat Intellignce (GTI)

© Computer Network Defence Limited 2022