List Categories and Listings by W
WEPCrack is an open source tool for breaking 802.11 WEP secret keys
Formerly Ethereal. Wireshark is the world's foremost network protocol analyzer, and is the de facto (and often de jure) standard across many industries, Features Include: Deep inspection of hundreds of protocols, with more being added all the time L ...
The WPScan CLI tool is a free, for non-commercial use, black box WordPress security scanner written for security professionals and blog maintainers to test the security of their sites.
WebGoat is a deliberately insecure web application maintained by OWASP designed to teach web application security lessons. You can install and practice with WebGoat in either J2EE (this page) or [WebGoat for .Net] in ASP.NET. In each lesson, users must d ...
Wifi Analyzer is a free Android app you can use for finding APs on your Android-based smartphone or tablet. It lists the basic details for APs on the 2.4-GHz band, and on supported devices on the 5-GHz band as well. You can export the AP list (in XML form ...
Elcomsoft Wireless Security Auditor examines the security of your wireless network by attempting to break into the network from outside or inside. Elcomsoft Wireless Security Auditor works completely in off-line, undetectable by the Wi-Fi network being pr ...
The WiFi Pineapple is a unique device developed by Hak5 for the purpose of WiFi auditing and penetration testing. Since 2008 the WiFi Pineapple has grown to encompass the best rogue access point features, unique purpose-built hardware, intuitive web inter ...
Open-source wardriving app to netstumble, display and map found wireless networks and cell towers anywhere in the world, easily uploading to the http://wigle.net database. WiGLE was started in 2001 and now has over 150 million wifi networks worldwide. ...
Wfuzz is a tool designed for bruteforcing Web Applications, it can be used for finding resources not linked (directories, servlets, scripts, etc), bruteforce GET and POST parameters for checking different kind of injections (SQL, XSS, LDAP,etc), bruteforc ...
WebSlayer is a tool designed for bruteforcing Web Applications, it can be used for finding not linked resources (directories, servlets, scripts, etc), bruteforce GET and POST parameters, bruteforce Forms parameters (User/Password), Fuzzing, etc. The tools ...
Wireless Protector is windows software that automatically disables wireless 802.11 / Broadband devices on computers that connected to the network LAN and re-enable the devices when the LAN cable is disconnected from the protected compu ...
Wapiti - Web application vulnerability scanner / security auditor Wapiti allows you to audit the security of your web applications. It performs "black-box" scans, i.e. it does not study the source code of the application but it will scan the webpages of ...
WP Security Scan checks your WordPress website/blog for security vulnerabilities and suggests corrective actions such as: 1. Passwords 2. File permissions 3. Database security 4. Version hiding 5. WordPress admin protection/security ...
w3af is a Web Application Attack and Audit Framework. The project's goal is to create a framework to find and exploit web application vulnerabilities that is easy to use and extend. The framework is extended using plugins. For now, think about nessus p ...
Complete PC threat protection including antivirus, antispyware, and firewall security Securely backs up over 5,000 photos online* (10GB) Improves PC performance with system cleanup More effective against malware than competing Internet security softw ...
Waterfall’s™ Unidirectional Security Gateways and data diodes core is shared by all of its products and solutions. The Waterfall core, a unique non routable system, is coupled with software agents that mediate its integration into the surrounding envir ...
WebHawk, next generation content filtering for one third the cost. Content Filtering WebHawk filters automatically block inappropriate websites based on the categorizations you define. Webhawk also monitors and logs all user web activity. In addition ...
The Windows Identity Foundation helps simplify user access for developers by externalizing user access from applications via claims and reducing development effort with pre-built security logic and integrated .NET tools.
Webroot Business Endpoint Protection helps businesses keep critical systems, intellectual property, customer data, employees and guests safe from ransomware, phishing, malware and other cyberattacks. Stop sophisticated cyberattacks Next-generation pro ...
Endpoint protection, or endpoint security, is a general term that describes cybersecurity services for network endpoints, like laptops, desktops, smartphones, tablets, servers, and virtual environments. These services may include antivirus and antimalware ...