Windows

Microsoft Windows

Faronics-Deep Freeze

Added by recommendation from K80
Faronics Deep Freeze helps eliminate workstation damage and downtime by making computer configurations indestructible. Once Deep Freeze is installed on a workstation, any changes made to the computer—regardless of whether they are accidental or malicious—are never permanent. Deep Freeze provides immediate immunity from many of the problems that plague computers today—inevitable configuration drift, accidental system misconfiguration, malicious software activity, and incidental system degradation.

Deep Freeze ensures computers are absolutely bulletproof, even when users have full access to system software and settings. Users get to enjoy a pristine and unrestricted computing experience, while IT personnel are freed from tedious helpdesk requests, constant system maintenance, and continuous configuration drift.

AirCrack

Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, Aircrack-ng is a set of tools for auditing wireless networks.

My Personal Rating: 5/5 Yes there are better ones like AirMagnet But this one is easy to use and free combine it with commview and your well-away

Rcrack

RainbowCrack is a general propose implementation of Philippe Oechslin's faster time-memory trade-off technique.
In short, the RainbowCrack tool is a hash cracker. A traditional brute force cracker try all possible plaintexts one by one in cracking time. It is time consuming to break complex password in this way. The idea of time-memory trade-off is to do all cracking time computation in advance and store the result in files so called "rainbow table". It does take a long time to precompute the tables. But once the one time precomputation is finished, a time-memory trade-off cracker can be hundreds of times faster than a brute force cracker, with the help of precomputed tables.

Some ready to work lanmanager and md5 tables are demonstrated in Rainbow Table section. One interesting table set is the lm configuration #6 tables, with which we can break any windows password up to 14 characters in a few minutes.

My Rating on this: 4/5 (Quite Limited on the MD5 table compared to what you can do with LM and SHA allover power little app)

Cain and Abel

Windows password cracker, capable of cracking a variety of hashes, as well as arp poisoning, sniffing the network, etc.. to obtain those password hashes in the first place.

John the Ripper

Free open-source software (if you want to buy you can always get the pro version)
John has been, and continues to still be, the most famous and most widely used password cracker for linux/unix systems.
Things everyone likes about it:
It's fast, it has support for cracking a lot of different but commonly used hash types, and it's able to run on just about anything.

OTR (Off-The-Record) Messaging

Encryption for Pidgin; this enables secure transmission of encrypted conversation so that you and the person you are speaking with are assured the conversation is not being hijacked by a third party.

Metasploit

The Metasploit Framework is a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide. The framework is written in the Ruby programming language and includes components written in C and assembler.

Bloodshed IDE

Integrated Development Environment (IDE) for the C/C++ programming language.

MiniPE

Antivirus for a usb devices, such has scan disk, or a external hard drive.

http://minipe.org/

Nmap

Written by Fyodor of insecure.org, nmap is one of the most common and most popularly noted tools in any hackers arsenal.
It's common abilities are port scanning host on a network to determine which ports are open and which services are running.
It has a very wide feature set of determining what device is being scanned whether it's cisco, juniper, windows98, windows 2003 server, red hat, debian, suse/novell, etc...

It does support 64bit processing now, it does support ipv4 & v6, it does support tcp & udp, it does support mac, linux, bsd, solaris, windows, and a whole bunch of other operating systems that you may pray to never have to work with.
From personal experiences it runs on my ps3, so just about anything out there.

Nmap has the ability to not only obtain information about a host by querying that host, but can also obtain information about a host by querying information for it, from it's peers on the network.
By using Nmap's TCP Idle Scanning technique it has been deemed possible to bypass filters such as access list, ip tables, and intrusion prevention systems under certain circumstances.

For more information about about Nmap please go to http://nmap.org/
For more information regarding the TCP Idle scan the link is http://nmap.org/book/idlescan.html

Syndicate content