|
|
|
|
|
|
|
The Protector: Unified Threat Management
Unified threat management such as the Protector from Secpoint allows you to secure your entire company network and protected it from hackers and malware with a single appliance. Ключевые слова:
unified threat management, UTM Appliance, UTM
Скачать бесплатно! (32 Mb)
|
|
|
The Penetrator Vulnerability Scanner
Penetrator Vulnerability Scanner is a complete solution for thoroughly scanning your company's network including all of its clients, servers and devices for vulnerabilities. It automates the process, saving huge amounts of manual labor. Ключевые слова:
Vulnerability scanner, vulnerability assessment, vulnerability scanning
Скачать бесплатно! (26.86 Mb)
|
|
|
Portable Penetrator
Portable Penetrator is a complete solution for securing your wireless network and identifying any security flaws before hackers have a chance to do so. This wifi security software provides detailed reports, exposing security issues quickly. Ключевые слова:
wifi security software, wpa cracking, wpa2 cracking, wpa crack, wep crack
Скачать бесплатно! (32 Mb)
|
|
|
Multi Threaded TCP Port Scanner
TCP Port scanner Multi threaded with possibility to scan 65535 TCP ports on an IP address. You can specify how many threads to run and the timeout. Further more it will tell you the MAC address of the target and the service running. Ключевые слова:
Multi Threaded, TCP, Port Scanner, portscan, port scanner
Скачать бесплатно! (1.11 Mb)
|
|
|
Cloud Penetrator
Cloud Penetrator - Online Web Vulnerability Scanning - SQL Injection Cross Site Scripting. SecPoint delivers the best online vulnerability scanning service. Prevent Hackers from hacking your web servers and stealing sensitive information! Ключевые слова:
web vulnerability scanner, sql injection, cross site scripting, web site security
Скачать бесплатно! (32 Mb)
|
|
|
|
|
|
|