Newest Listing

Top Rated

Most Popular

Visit the Product Site

Unicornscan is a new information gathering and correlation engine built for and by members of the security research and testing communities. It was designed to provide an engine that is Scalable, Accurate, Flexible, and Efficient. It is released for the c ...

VendorLinux, NetBSD, FreeBSD, and Solaris
Pricing ModelFreeware
Modified

Visit the Product Site

Let the Linksys USB VPN and Firewall Adapter protect your PC and your communications wherever you go. This easy-to-pack, lightweight, network interface with advanced safety and security features connects you to the Internet through any broadband connectio ...

Category:VPN Clients
VendorLinkSys / Cisco Systems
Pricing ModelCommercial
Modified

Visit the Product Site

The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security of computer systems and networks.

ModifiedNever

Visit the Product Site

This five-day class is designed for those security officers, IT auditors and administrators who want to learn how to penetration test their organization?s network. This class, taught by two members of the Canaudit "Strike Force", will teach you how to at ...

Category:Ethical Hacking
VendorCanaudit, Inc
ModifiedNever
Ultimate Hacking

Visit the Product Site

Because security is an ever-changing battlefield, Ultimate Hacking exposes you to the latest in web application and network vulnerabilities and defenses. From Windows and Unix hosts to web applications and backend databases, instructors will illustrate ea ...

Category:Ethical Hacking
VendorMcAfee
Pricing ModelCommercial
Modified

Visit the Product Site

A hands-on course focusing on security of UNIX systems. Hands on sessions will be with Red Hat Linux but the course covers all flavours of UNIX and highlights differences.

VendorSystems & Network Training Ltd
ModifiedNever

Visit the Product Site

This course will give the ultimate comparison of classic Windows attacks directed at Windows 2000 and Windows 2003 networks. Using the unique Foundstone Hands-On approach and an innovative parallel learning technique, you will execute all demonstrations, ...

VendorMcAfee
Pricing ModelCommercial
Modified

Visit the Product Site

What Will You Learn? For the advanced security engineer, this course is the pinnacle of the Ultimate Hacking series and is a continuation of the Ultimate Hacking: Hands On course. It encompasses such topics as wireless security, SQL injection techniques, ...

Category:Ethical Hacking
VendorFoundstone, Inc.
Pricing ModelCommercial
Modified

Visit the Product Site

What Will You Learn? Foundstone consultants/instructors bring real-world experience to the classroom to empower you with the skills to assess your security posture and implement effective countermeasures. As always Foundstone brings its consulting experie ...

VendorFoundstone now McAfee
Pricing ModelCommercial
Modified

Visit the Product Site

Unhide is a forensic tool to find hidden processes and TCP/UDP ports by rootkits / LKMs or by another hidden technique. // Unhide (ps) Detecting hidden processes. Implements six techniques * Compare /proc vs /bin/ps output * Compare inf ...

Category:Forensic Tools
VendorYago Jesus and Patrick Gouin
Pricing ModelOpen Source
Modified

Visit the Product Site

The elder statesman of our Utilikilt line, the Original is lightweight, comfortable and comes with deep and functional side saddle cargo pockets. The Original is our simplest, most practical and most affordable Utilikilt. The Original is the Utilikilt ...

Category:Geeky Gadgets
VendorUtilikilts
Pricing ModelCommercial
ModifiedNever

Visit the Product Site

If you own the website and want to protect your website from the effects of cracking, this website scanner will allow you to: be the first who know that have been changed existing modules or added new modules on your website without your knowledge, ge ...

VendorUuuh
Pricing ModelShareware
Modified
UMRA

Visit the Product Site

UMRA is a complete User Management System that simplifies Active Directory Management across all your systems. While managing user account and authorization processes in Active Directory and adjacent systems, UMRA also offers delegation of user account ma ...

VendorTools4ever, Inc.
Pricing ModelCommercial
Modified
USB Rubber Ducky Deluxe

Visit the Product Site

'Since 2010 the USB Rubber Ducky has been a favorite among hackers, penetration testers and IT professionals. With origins as a humble IT automation proof-of-concept using an embedded dev-board, it has grown into a full fledged commercial Keystroke I ...

Category:Geeky Gadgets
VendorHakshop
Pricing ModelCommercial
Modified

Visit the Product Site

USBDeviceForensics is an application to extract numerous bits of information regarding USB devices. it uses the infomration from a SANS blog posting to retrieve operating system specific information. It now has the ability to process multiple NTUSER.dat r ...

Category:Forensic Tools
VendorWoanware
Pricing ModelFreeware
Modified