Your download link is at the very bottom of the page... always.



Processed through Paypal
No account required.


Donate Bitcoin to this wallet:
1KkUMXvQ2ko3xcJkzitB7WYgoW6m79WFfm
Donate Ethereum to this wallet:
0x40E56922F43637224935CDC35e2c96E0392A8505
Donate Litecoin to this wallet:
LLYAFEyqjH69gkyCEpRjXNyedRCWrVChfL

Buy our over-priced crap to help keep things running.
Take No CrapwareOG Dad CapNo Password


Join our Facebook groupFollow us on TwitterFollow us on InstagramOur RSS FeedJoin us on TikTokJoin us on LinkedIn


 Home » OlderGeeks.com Freeware Downloads » Searching Files   
Search
Search Terms
Search Category Leave category selection blank to search within all categories.
Search Results
Files
  File Name Rating Downloads
Last Update/Developer
Eternal Blues 0.0.0.8
Eternal Blues 0.0.0.8 Eternal Blues is a free EternalBlue vulnerability scanner. It helps finding the blind spots in your network, these endpoints that are still vulnerable to EternalBlue. Just hit the SCAN button and you will immediately start to get which of your computers are vulnerable and which aren’t. That’s it. If you wish, you can switch networks, or edit your own (yeah, you can also scan the world wide web if you wish). Please use it for good cause only. We have enough bad guys already… Was this tool tested in real networks? Oh yeah. Obviously I cannot say which, but with almost every network I connected to, there were a few vulnerable computers. IMPORTANT: It does *not* exploit the vulnerability, but just checks whether it is exploitable. Yet another vulnerability scanner? There are many vulnerability scanners out there. So… why did I create another? Mainly for the ease of use. The majority of latest WannaCry, NoPetya (Petya, GoldenEye or whatever) victims, are not technical organizations and sometimes just small business who don’t have a security team, or even just an IT team to help them mitigate this. Running NMap, Metasploit (not to mention more commercial products) is something they will never do. I aimed to create a simple ‘one-button’ tool that tells you one thing and one thing only – which systems are vulnerable in your network. Tips If you’re about to run it in your working environment, please update the IT/Security team in advance. You don’t want to cause (IDS/IPS/AV) false alarms If vulnerable systems were found – please take a Windows update asap For God’s sake, please disable SMBv1 already. Whether your systems are patched or not. This protocol was written over 3 decades ago…! If you would like to enjoy the ...
5/5 4,928 Nov 13, 2019
Omerez <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/EternalBlues1_th.png"border="0">
Linux Kodachi v8.27
Linux Kodachi v8.27 Secure, open source Linux distribution Linux Kodachi operating system is based on Ubuntu 18.04.6 LTS it will provide you with a secure, anti forensic, and anonymous operating system considering all features that a person who is concerned about privacy would need to have in order to be secure. Kodachi is very easy to use all you have to do is boot it up on your PC via USB drive then you should have a fully running operating system with established VPN connection + Tor Connection established + DNScrypt service running. No setup or Linux knowledge is required from your side we do it all for you. The entire OS is functional from your temporary memory RAM so once you shut it down no trace is left behind all your activities are wiped out. Kodachi is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity. Features • VPN Ready • Tor Ready with exit node selection • DNScrypt ready • Onion Circuits/Onion share • i2p • GNUNET • Exodus multi currency wallet • Rkhunter • Peer Guardian • Panic Room • Bleachbit • Atom • Audicity • Zulucrypt • System and Security Info on Desktop • Wipe Ram • Wipe Free Space • Kill OS! • Nautilus-wipe • Keepass2x • Seahorse • Gpa ...
5/5 2,226 Feb 15, 2024
eeds <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/LinuxKodachi3_th.png"border="0">
NetworkTrafficView v2.43
NetworkTrafficView v2.43 A free network monitoring tool that captures the packets pass through your network adapter, and displays general statistics about your network traffic. The packets statistics is grouped by the Ethernet Type, IP Protocol, Source/Destination Addresses, and Source/Destination ports. For every statistics line, the following information is displayed: Ethernet Type (IPv4, IPv6, ARP), IP Protocol (TCP, UDP, ICMP), Source Address, Destination Address, Source Port, Destination Port, Service Name (http, ftp, and so on), Packets Count, Total Packets Size, Total Data Size, Data Speed, Maximum Data Speed, Average Packet Size, First/Last Packet Time, Duration, and process ID/Name (For TCP connections). Changes: v2.43: Fixed bug: NetworkTrafficView randomly crashed when using the GeoLite2 City database. System Requirements • This utility works on any version of Windows, starting from Windows 2000 and up to Windows 11, including 64-bit systems. • One of the following capture drivers is required to use NetworkTrafficView: - Npcap capture driver Npcap is an open source capture driver based on the discontinued WinPcap library that allows you to capture network packets on any version of Windows. You can download and install the Npcap driver from this Web page. - Microsoft Network Monitor Driver version 3.x (Windows Server 2008, Windows XP Service Pack 3, Windows Server 2003 Service Pack 2, Windows Server 2003 Service Pack 2 x64 Edition, Windows Server 2008 R2 for Itanium-based Systems, Windows Server 2008 R2, Windows XP 64-bit, Windows Vista Service Pack 1, Windows Server 2012, Windows 7, Windows 8, Windows Vista 64-bit Editions Service Pack 1 ): Microsoft provides a free capture driver under Windows 2000/XP/2003 that can be used by NetworkTrafficView, but this driver is not installed by default, and you have ...
5/5 8,591 Mar 31, 2023
Nir Sofer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/networktrafficview_th.png"border="0">
Nmap Security Scanner v7.94
Nmap Security Scanner v7.94 A free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), a utility for comparing scan results (Ndiff), and a packet generation and response analysis tool (Nping). Features: Flexible: Supports dozens of advanced techniques for mapping out networks filled with IP filters, firewalls, routers, and other obstacles. This includes many port scanning mechanisms (both TCP &amp; UDP), OS detection, version detection, ping sweeps, and more. See the documentation page. Powerful: Nmap has been used to scan huge networks of literally hundreds of thousands of machines. Portable: Most operating systems are supported, including Linux, Microsoft Windows, FreeBSD, OpenBSD, Solaris, IRIX, Mac OS X, HP-UX, NetBSD, Sun OS, Amiga, and more. Easy: While Nmap offers a rich set of advanced features for power users, you can start out as simply as "nmap -v -A targethost". Both traditional command line and graphical (GUI) versions are available to suit your preference. Binaries are available for those who do not wish to compile Nmap from source. Free: The primary ...
5/5 9,278 Nov 21, 2023
Nmap <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/nmap4_th.png"border="0">
tcpTrigger v1.2.4
tcpTrigger v1.2.4 tcpTrigger is a Windows service intended to notify you of incoming network connections. You specify a TCP port to monitor and an action to take. Actions taken include: sending a notification email and/or launching an external application or script. Your action will then be triggered each time an incoming connection is attempted on your specified port. Notes .NET 3.5 or greater is required to run the service. .NET 4.5 or greater is required to run the graphical configuration editor. The installer does not do a prerequisites check, so make sure you have the required .NET frameworks. The pre-compiled installer is not code-signed, so you will get a scary warning when you run it. My build environment is Microsoft Visual Studio Community 2015 and WiX Toolset v3.10. Features Intrusion Detection For a simple, yet effective, internal intrusion detection system, deploy tcpTrigger. Attackers who are unfamiliar with your network, must first map out live hosts and running services. This is typically accomplished with a port scanner, such as Nmap. An intruder cannot steal sensitive documents without first discovering your file servers, and they cannot dump your user mailboxes without first discovering your email servers. If your tcpTrigger system gets probed, you will be alerted of the intrusion. Your tcpTrigger system can alert on incoming ICMP echo requests or on connections to any TCP port. You can monitor ports with existing services or even ports with nothing listening. Detection works the same whether the port is open or closed. It will even detect 'half-open' connections used by most port scanners. For an IDS deployment in an enterprise environment, install tcpTrigger on a dedicated system and configure it to ...
5/5 4,961 Nov 13, 2019
Ryan Smith <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/tcpTrigger_1g_th.png"border="0">
   
Showing rows 1 to 5 of 5 Showing Page 1 of 1  1 


OlderGeeks.com Copyright (c) 2024