Saturday, June 7, 2008

Retina Network Security Scanner - Corporate License





Network Vulnerability Assessment:

Fastest, Most Accurate, Non-Intrusive Security Scanner - Retina will scan an entire Class C network in less than 15 minutes. It will quickly identify security threats on every machine on your network, identifying operating systems, networked devices or custom applications. This gives security administrators a considerable time advantage over attacks leveraging known vulnerabilities, or when performing vulnerability testing activities. Retina does not use exploit code and typically does not require administrative rights to function, thereby allowing for completely non-intrusive scans across the network where applications or services are not impacted as part of your vulnerability assessment process.

Superior Research Team Contributes to Better Security Scanner - No security vendor can match the technical expertise of the eEye Research Team, having discovered more high-risk vulnerabilities than all other research groups combined. The intellectual capital amassed through this research team is continually being added to Retina’s scanning capabilities and contributes to each new version release.

Best Practices Vulnerability Assessment Workflow - Retina guides users through the logical steps of discovering assets, performing audits for known vulnerability and configuration issues, and then recommending remediation actions to address the identified vulnerabilities. Your entire vulnerability management process will then be documented through either the included reporting functionality of Retina, or further augmented through the extended reporting capabilities of REM Security Management Console to achieve corporate and regulatory compliance for network security.
Key Reasons to Choose Retina For Network Vulnerability Assessment:

* Comprehensive, Frequently Updated Database
* Multiplatform Security Scanning
* Advanced Scheduling Capabilities
* Customizable Reporting
* Remediation Prioritization and Automation
* Custom Security Audits
* Smart Scanning Technology
* Open Architecture for Third Party Application Integration, including IBM Tivoli, CA Unicenter, BMC Remedy, HP OpenView, and others

System Specifications:

* Windows 2000/XP/2003
* Internet Explorer Version 5.0 or higher
* 256 MB of memory
* 40 MB of free disk space

Awards:

Retina has received recognition from leading technical publications and product reviewers with exceptional ratings


download:-

http://rapidshare.com/files/120597739/Retina_5.09.1067.rar

password:-r00tshell

Friday, June 6, 2008

exe script crack version




ExeScript is an excellent solution for advanced PC users who do not know any programming languages. They can create (compile) their own executable files without writing a single line of code.

There are number of features unique to this program, for example, "silent mode" support - a stealth batch file feature that makes execution of converted scripts "invisible" to other users.

Those who know a little bit of programming will like the fact that ExeScript comes with a built-in .bat, .vbs .js, WSF, WSH and HTA file editor which features syntax highlighting and makes editing of files a simple and straightforward process.

ExeScript provides a number of other benefits. For instance, it can be used for automating scheduled tasks execution. The program can also be used to help you create installation files and deployment modules.

ExeScript is fast, simple and compiles any .bat, .vbs, .js, .wsf, .wsh and .hta file to .exe format files. It is compatible with Windows 2000/XP/2003/Vista/x64 Edition. Executable packages created with ExeScript can be run in all Windows operating systems.

ExeScript has the following unique features:

* Converts batch files, VBScript and Jscript into executable files (exe format).
* Protects contents of .bat, .vbs, .js files from modification by other users.
* Contents of generated executables are hidden. The operations performed by converted batch files, VBScript and Jscript can remain secret.
* Users without programming languages can create their own executable programs (exe files).
* Supports "silent mode" - batch files execute invisibly, their launch can be invisible to other users.
* Encrypts file contents.
* Script Type - it is possible to specify the script type - windowed or console.
* Command Line - the command line running the script.
* Executing the script in computer memory without writing to the disk. Therefore, the security of the script is enhanced since it is impossible to see the contents.
* Password-protected launch of the compiled script. You can set a password for running the script converted into an exe application.
* The new built-in file editor for .bat, .vbs, .js files has syntax highlighting.
* ExeScript is ideal for automating many of the routine chores that must be carried out when working with computers.
* Helps you create installation packages for the deployment of modules and programs.
* Converts any .bat, .vbs and .js files into exe files compatible with Windows 2000/XP/2003/Vista/x64 Edition.


download:-

http://rapidshare.com/files/120523548/exe_script.rar

pass:-r00tshell

hackig exposed 2nd edition most wanted





Implement bulletproof e-business security the proven Hacking Exposed way

Defend against the latest Web-based attacks by looking at your Web applications through the eyes of a malicious intruder. Fully revised and updated to cover the latest Web exploitation techniques, Hacking Exposed Web Applications, Second Edition shows you, step-by-step, how cyber-criminals target vulnerable sites, gain access, steal critical data, and execute devastating attacks. All of the cutting-edge threats and vulnerabilities are covered in full detail alongside real-world examples, case studies, and battle-tested countermeasures from the authors' experiences as gray hat security professionals.
Table of contents

Chapter 1: Hacking Web Apps 101
Chapter 2: Profiling
Chapter 3: Hacking Web Platforms
Chapter 4: Attacking Web Authentication
Chapter 5: Attacking Web Authorization
Chapter 6: Input Validation Attacks
Chapter 7: Attacking Web Datastores
Chapter 8: Attacking XML Web Services
Chapter 9: Attacking Web Application Management
Chapter 10: Hacking Web Clients
Chapter 11: Denial-of-Service (DoS) Attacks
Chapter 12: Full-Knowledge Analysis
Chapter 13: Web Application Security Scanners
APPENDIX A: WEB APPLICATION SECURITY CHECKLIST
APPENDIX B: WEB HACKING TOOLS AND TECHNIQUES CRIBSHEET
APPENDIX C: URLScan AND ModSecurity
APPENDIX D: ABOUT THE COMPANION WEB SITE
INDEX
Biographical note

Joel Scambray, CISSP, is a Senior Director at Microsoft Corporation, where he led Microsoft's online services security efforts for three years before joining the Windows platform group to focus on security technology development. He has more than 15 years of information security experience, including senior management roles at Ernst & Young, co-founder of Foundstone, technical consultant for Fortune 500 enterprises, and co-author of the best-selling Hacking Exposed book series.
Mike Shema, is the CSO of NT Objectives and has made web application security presentations at numerous security conferences. He has conducted security reviews for a wide variety of web technologies and developed training material for application security courses. He is also a co-author of Anti-Hacker Toolkit.
Caleb Sima, is the co-founder and CTO of SPI Dynamics, a web application security products company, and has more than 12 years of security experience. His pioneering efforts and expertise in web security have helped define the direction the web application security industry has taken. Caleb is a frequent speaker and expert resource for the press on Internet attacks and has been featured in the Associated Press. He is also a contributing author to various magazines and online columns. Caleb is a member of ISSA and is one of the founding visionaries of the Application Vulnerability Description Language (AVDL) standard within OASIS, as well as a founding member of the Web Application Security Consortium (WASC).
Back cover copy

Implement bulletproof e-business security the proven Hacking Exposed wayDefend against the latest Web-based attacks by looking at your Web applications through the eyes of a malicious intruder. Fully revised and updated to cover the latest Web exploitation techniques, Hacking Exposed Web Applications, Second Edition shows you, step-by-step, how cyber-criminals target vulnerable sites, gain access, steal critical data, and execute devastating attacks. All of the cutting-edge threats and vulnerabilities are covered in full detail alongside real-world examples, case studies, and battle-tested countermeasures from the authors' experiences as gray hat security professionals. Find out how hackers use infrastructure and application profiling to perform reconnaissance and enter vulnerable systemsGet details on exploits, evasion techniques, and countermeasures for the most popular Web platforms, including IIS, Apache, PHP, and ASP.NET Learn the strengths and weaknesses of common Web authentication mechanisms, including password-based, multifactor, and single sign-on mechanisms like PassportSee how to excise the heart of any Web application's access controls through advanced session analysis, hijacking, and fixation techniquesFind and fix input validation flaws, including cross-site scripting (XSS), SQL injection, HTTP response splitting, encoding, and special character abuseGet an in-depth presentation of the newest SQL injection techniques, including blind attacks, advanced exploitation through subqueries, Oracle exploits, and improved countermeasuresLearn about the latest XML Web Services hacks, Web management attacks, and DDoS attacks, including click fraudTour Firefox and IE exploits, as well as the newest socially-driven client attacks like phishing and adware


download:-
http://rapidshare.com/files/120520076/
hacking_exposed_2nd_r00tshell.rar

pass:-r00tshell

autoitv3 latest version

$$$$$$$$$$$$$$$great programing for hackers and newbies simple powerful$$$$$$$$$$

AutoIt v3 is a free ware BASIC-like scripting language designed for automating the Windows GUI and general scripting. It uses a combination of simulated keystrokes, mouse movement and window/control manipulation in order to automate tasks in a way not possible or reliable with other languages (e.g. VBScript and SendKeys). AutoIt is also very small, self-contained and will run on all versions of Windows out-of-the-box with no annoying "runtimes" required!

AutoIt was initially designed for PC "roll out" situations to reliably automate and configure thousands of PCs. Over time it has become a powerful language that supports complex expressions, user functions, loops and everything else that veteran scripters would expect.

Features:

* Easy to learn BASIC-like syntax
* Simulate keystrokes and mouse movements
* Manipulate windows and processes
* Interact with all standard windows controls
* Scripts can be compiled into standalone executables
* Create Graphical User Interfaces (GUIs)
* COM support
* Regular expressions
* Directly call external DLL and Windows API functions
* Scriptable RunAs functions
* Detailed helpfile and large community-based support forums
* Compatible with Windows 95 / 98 / ME / NT4 / 2000 / XP / 2003 / Vista / 2008
* Unicode and x64 support
* Digitally signed for peace of mind
* Works with Windows Vista's User Account Control (UAC)

AutoIt has been designed to be as small as possible and stand-alone with no external .dll files or registry entries required making it safe to use on Servers. Scripts can be compiled into stand-alone executables with Aut2Exe.

Also supplied is a combined COM and DLL version of AutoIt called AutoItX that allows you to add the unique features of AutoIt to your own favourite scripting or programming languages!


download:-
http://rapidshare.com/files/120516097/autoit3.rar

2 in one great key logger inside and spytech

2 great key logger from spy tech and inside key logger registered version

enjoy greets to r00tshell and str0ke

download link:-

home page
www.inside-logger.com

www.spytech-web.com

http://rapidshare.com/files/
120508906/2key.rar