Vulnerability Verification


Advertisement

Metasploit Framework  v.4.0

The Metasploit® Framework is a free, open source penetration testing solution developed by the open source community and Rapid7.

Metasploit  v.4. 1. 2004

The Metasploit Framework is both a penetration testing system and a development platform for creating security tools and exploits.





Advertisement

Image Verification Service ( CAPTCHA )

You needed to paste Single line Java script code, will Initiate CIS Image verification Engine to generate CAPTCHA Image using "Random Numbers, Characters and Background" and will place it on your webpage automatically. It do not have its own Submit button

.NET Framework Setup Verification Utility  v.20-02-2010

This .NET Framework setup verification tool is designed to automatically perform a set of steps to verify the installation state of one or more versions of the .NET Framework on a computer. It will verify the presence of files, directories,

Free Fingerprint Verification SDK  v.1.0

Freeware SDK and components for biometrical application development for Windows platform. Most suitable for developing biometrical logon applications. Allows reading fingerprints only from scanners, storing up to 10 fingerprint records in an

Application Service Level Vulnerability Assessment Test for .NET  v.3.95

Conduct internal software audits for Microsoft.NET based Web applications to validate software quality and compliance with service level requirements.

Application Service Level Vulnerability Assessment Test for Java  v.3.97

Conduct internal software audits for Java-based Web applications to validate software quality and compliance with service level requirements.

Verification Engine

VerificationEngine (VE) is an innovative free multi-browser anti-phishing & identity assurance tool to help consumers achieve a new level of online transactional security two ways. First, it helps consumers differentiate between good business-verified

Vulnerability Scanning Cluster  v.2.0

The VSC is a PHP/MySQL/Apache Interface for Nessus 2.

Backup verification tool  v.1.3

cpverify verifies that a file or directory structure has been copied or burned without errors.

Quttera

Quttera is a Signatureless Malicious Content Detection Solution designated especially to identify the potentially malicious executable code, zero-day vulnerability exploit and shellcode embedded into computer files such as movies, images, documents and

ICE ECC

ICE ECC is a file verification and repair tool. ICE ECC allows you to protect your important files and sensitive data against digital corruption using Reed-Solomon codes. Did you know that a typical CD-R/DVD-R disk can hold its data intact for only

Pages : All
Newest Reviews