Metasploit Framework 4.0
The Metasploit® Framework is a free, open source penetration testing solution developed by the open source community and Rapid7. It is the de-facto standard for penetration testing with more than one million unique downloads per year and the ...
- Audio & Multimedia
- Business
- Communications
- Desktop
- Development
- Education
- Games
- Graphics
- Home & Hobby
- Network & Internet
- Screen Savers
- Security & Privacy
- Servers
- System Utilities
- Web Development
- Pen Drive Recovery Data
- Aiseesoft FoneLab iPhone...
- Flash Recover
- Reciprocal Links Checker Tool
- SSuite Office Premium HD+
- FoneLab HyperTrans
- AnyMP4 Blu-ray Creator
- FAT Volume Data Recovery
- Restore Deleted Mac Files
- Quick Receipt Software
- UltraFileSearch Std Portable
- MSMassEmailSenderPro
- USB Flash Drive Recovery
- Softaken MS Excel Recovery
- ToolsBaer MSG to Hotmail...
- ADRC Data Recovery Tools
- avast! Antivirus
- Revo Uninstaller
- Java Runtime Environment
- AVG Anti-Virus Free Edition
- GOM Media Player
- RegSeeker
- IrfanView
- CPU-Z
- Malwarebytes Anti-Malware
- Spybot Search & Destroy
- Skype
- µTorrent
- Ai File Extension Editor
- Remove Drm From Pdf Files
- Download Word Templates For...
- Assault Cube Sounds
- Download Song As Zip File
- Rankquest Watchseo
- Free Becker Cpa
- Creative Smiley Faces Text
- Portable Photo Editor Free...
- Screen Capture Master
- Bat Merge
- Daz Iso Compressor
- Destroy Recycle Bin Windows
- Decode Firefox Cache File
- Link Directory Script
Vulnerability Verification Download
-
1Freeware
-
2Protector Plus Vulnerability
Once the Scan is completed, Protector Plus - Windows Vulnerability Scanner lists the vulnerabilities detected, their risk level and the download location of the patch. It also creates the log file named Protector_Plus_Windows_Vulnerability_Scan.htm ...Freeware -
3Free Win Vulnerability Scanner 2.03
Once the Scan is completed, Protector Plus - Windows Vulnerability Scanner lists the vulnerabilities detected, their risk level and the download location of the patch. It also creates the log file named Protector_Plus_Windows_Vulnerability_Scan.htm ...Freeware -
4Finger Verification Control 1.0
The software enables integrators and value added resellers to incorporate highly accurate fingerprint based verification into their applications. There’s no need for fingerprint verification image processing, encoding or matching knowledge.$59.00 -
5E-mail Verification Software 2.0
E-mail Verification Software is a very effective piece of software that can verify over 10 e-mails per second . It can verify single e-mails or huge lists. (Our E-mail Verification Software is multithreaded, providing high speed verifying). Our E-mail ...$38.95 -
6Free Windows Vulnerability Scanner
Protector Plus Free Windows Vulnerability Scanner is compatible with Windows 7 ,Windows Vista, Windows XP, Windows 2000, Windows 98, Windows NT, Windows Server 2003, Windows Server 2008. Once the Scan is completed, Protector Plus - Windows Vulnerability ...Freeware -
7GraphiCode Dongle Verification
GraphiCode Dongle Verification Utility is a compact program designed to help the users of GraphiCode programs check if the security USB dongle is recognized by the computer. It features an easy to use interface that allows you to view the serial number ...Freeware -
8Windows Vulnerability Scanner 1.9
Protector Plus - Windows Vulnerability Scanner checks your system for Windows Vulnerabilities. It guides you to update with the right patch to make your system secure. This program is updated regularly by Proland Software to detect all the vulnerabilities ...Freeware -
9Nexpose Community Edition 5.0
The Nexpose Community Edition is a free, single-user vulnerability management solution specifically designed for very small organizations or individual use. Nexpose Community Edition is powered by the same scan engine as award-winning Nexpose Enterprise ...Freeware -
10VeriScan 1.0
VeriScan - access control, age verification and data capture application for desktop computers and servers running Windows OS Effective and easy to operate ID processing database software with ability to capture photo image via connected camera. Collect, ...$295.00 -
11Shadow Database Scanner 7.3
Safety Lab Shadow Database Scanner provides Vulnerability Management-Database Management and Analysis needs for SQL Server Security. Internet-enabled organizations need a database security solution that is flexible, easy to use and saves valuable resources.$595.00 -
12Metasploit Express 3.4
Metasploit Express is software optimized for security professionals with a broad range of responsibilities who need an accessible and affordable penetration testing solution to verify the findings of their vulnerability scanners without extensive training.$3,000.00 -
13Repscan 3.5
With more than 3000 security verifications scanning databases and applications, Repscan™ is the most comprehensive vulnerability assessment solution available Scalable: easily scan a single database instance - or up to hundreds of databases ... -
14Right File Auditor 1.02.10
The Right File Auditor is a verification and audit tool for data files. This easy to use tool helps you to save data correct by performing a few user defined checks like data type checks, column-to-column dependency check or regular expression matching.$59.00 -
15Apago PDF Appraiser 1.0.1
The PDF Appraiser application was developed to support both verification & automatic correction of PDF/A, the new international standard for long-term, electronic document archiving. PDF/A is the name for the set of standards covered by ISO 19005.$349.00 -
16CodeHealer 2.8.1
CodeHealer is an efficient, powerful and easy to use program source code analysis and verification tool that will help find and fix a significant number of programming bugs, mistakes and inconsistencies in programs before they are released. The information ...$299.00 -
17LogicSim 3.3
LogicSim is an affordable and user-friendly Verilog simulator for ASIC and FPGA design verification. It offers a powerful and easy-to-use graphical user interface that lets you quickly simulate your Verilog designs. It's built on our state-of-the-art ...$199.00 -
18ShadowSecurityScanner 7.55
Shadow Security Scanner (network vulnerability scanner) has earned the name of the fastest OCo and best performing OCo security scanner in its market sector, outperforming many famous brands. Shadow Security Scanner has been developed to provide a secure, ...$299.00 -
19Research Lab Speech Engines Suite
Includes Four Powerful Speech Engines: A-Speaker Verification Engine SDK. Useful in Secure Military Grade User Identity Verification - 2 MB of Redistribution. B-Speech Recognition Engine SDK . Recognizes Isolated, Language Independent Words - 2 MB of ...$1,200.00 -
20X13-VSA PRO Voice Lie Detector
X13-VSA PRO With Ultra High Sensitiv truth verification and emotion identification Modul - Designed especially for security officiall - is a Voice Stress Analysis Lie Detector Software. The most advanced voice analysis technology available today. X13-VSA ...$399.00 -
21Zipoid 1.1
ZIP Code verification, distance calculator and look-up tool. Calculate the distance ranges between different ZIP Code locations, look up area codes and all cities and towns located within the specified ZIP Code location. Or identify all ZIP Codes found ...Freeware -
22DTM Data Scrubber 1.09.02
DTM Data Scrubber is a set of intelligent tools for data verification and scrubbing Depending on user-defined rules and data properties, the program either creates a report about the actual state of affairs or performs database data correction. The program ...$179.00
Buy -
23ICE ECC 2.6
ICE ECC is a file verification and repair tool. ICE ECC allows you to protect your important files and sensitive data against digital corruption using Reed-Solomon codes.Did you know that a typical CD-R/DVD-R disk can hold its data intact for only a ...Freeware -
24FSUM 2.51
Free command line utility for file multi-checksum generation and verification. It allows to create/verify popular file hashes/checksums: MD2, MD4, MD5, SHA-1, SHA-2(256,384,512), RIPEMD-160, PANAMA, TIGER, CRC-32, ADLER32, and the message digest used ...Freeware -
25Maui Security Scanner 2.51.10
Maui is a automated next-generation web application vulnerability scanner. Able to quickly scan and analyze large complex web sites/applications, Maui identifies application vulnerabilities ( e.g. Cross Site Scripting (XSS), SQL injection, Code Inclusion ...$299.00