Page of 41
First page | Prev | Next | Last page |

Auto Txt

Category: Windows Hacking, Desktop Tools, Program Monitoring

Title: Auto Txt

Format:

Description: Auto.txt lists eleven known and unknown methods of starting programs upon bootup in Windows. Trojans, backdoors, and keyloggers often use these to restart themselves. Homepage: http://www.tlsecurity.net.

Download Now



Boss Everyware

Category: Windows Hacking, Desktop Tools, Program Monitoring

Title: Boss Everyware

Format: Win 9x/Me/NT4/2000

Description: Boss Everyware gives a clear picture of how a Windows computer is being used. It secretly logs program names, window titles, visited URLs, user names, and keystrokes. With its Report Manager, Boss Everyware provides a powerful tool for the analysis of logged data. Can monitor one or many computers. Homepage: http://boss.dids.com.

Download Now



Fgc Tools

Category: Windows Hacking, Desktop Tools, Program Monitoring

Title: Fgc Tools

Format:

Description: FGC_Tools exploits Fortress security by simply making calls to the DLL used by their program. Disables security or overwrites the password without prior knowledge of the current password. Includes TASM source. By Frost Byte

Download Now



Filemon

Category: Windows Hacking, Desktop Tools, Program Monitoring

Title: Filemon

Format: Windows 95

Description: Filemon is a GUI/device driver combination that together monitor and display all file system activity on a system. It has advanced filtering and search capabilities that make it a powerful tool for exploring the way Windows 95 works, seeing how applications use files and DLLs, or tracking down problems in system or application configurations.

Download Now



Incident Response Collection Report

Category: Windows Hacking, Desktop Tools, Program Monitoring

Title: Incident Response Collection Report

Format: Win NT/2000

Description: IRCR is a collection of tools that gathers and/or analyzes forensic data on a Microsoft Windows system. You can think of this as a snapshot of the system in the past. It is similar to TCT by Dan Farmer and Wietse Venema, as most of the tools are oriented towards data collection rather than analysis. The idea of IRCR is that anyone could run the tool and send the output to a skilled Windows forensic security person for further analysis. Homepage: http://www.incident-response.org/IRCR.htm. By John McLeod

Download Now


First page | Prev | Next | Last page |