Security & Encryption
Autopsy® is an easy to use, GUI-based program that allows you to efficiently analyze hard drives and smart phones. It has a plug-in architecture that allows you to find add-on modules or develop custom modules in Java or Python. The Sleuth Kit® is a collection of command line tools and a C library that allows you to analyze disk images and recover files from them. It is used behind the scenes in Autopsy and many other open source and commercial forensics tools.
CredentialsFileView is a simple tool for Windows that decrypts and displays the passwords and other data stored inside Credentials files of Windows. You can use it to decrypt the Credentials data of your currently running system, as well as the Credentials data stored on external hard drive.
VaultPasswordView is a simple tool for Windows 10/8/7 that decrypts and displays the passwords and other data stored inside 'Windows Vault'. You can use it to decrypt the Windows Vault data of your currently running system, as well as the Windows Vault data stored on external hard drive. Inside vault folders, there is Policy.vpol filename that contains the encryption key. The encryption key is used to decrypt the .vcrd files in the same vault folder.
AxCrypt is the leading open source file encryption software for Windows. It integrates seamlessly with Windows to compress, encrypt, decrypt, store, send and work with individual files. Features: Password Protect any number of files using strong encryption; Right-click integration with Windows Explorer makes AxCrypt the easiest way to encrypt individual files in Windows; Double-click integration makes it as easy to open, edit and save protected files as it is to work with unprotected files; ...
LSASecretsView is a small utility that displays the list of all LSA secrets stored in the Registry on your computer. The LSA secrets key is located under HKEY_LOCAL_MACHINE\Security\Policy\Secrets and may contain your RAS/VPN passwords, Autologon password, and other system passwords/keys. False Alert Problems: Some Antivirus programs detect this utility as infected with Trojan/Virus.
Usually, when you want to visit some of your favorite community websites, buy something over Internet or just check your mail, you are asked to enter your login information. Unfortunately it may happen that when you try to log on to websites you hardly ever visit, you just can't recall the password. To avoid this problem, people tend to use one password for multiple websites not realizing what would happen if the password was stolen. LoginCode is an answer to these problems allowing you to both securely store your passwords and automate logon operations.
WinAES is a light-weight and reliable security tool. It supports 2 symmetric-key algorithms (256-bit AES and Camellia) for file encryption, with CBC operating mode and randomized IV. It also has a file hash calculator with 5 hash functions, a convenient password generator and a secure file eraser.
Torifier lets you tunnel software applications through Tor without the need to reconfigure them. An application is not required to have native proxy support in order to work with Torifier. Torifier is a Tor bundle, meaning the program will install the Tor software and will manage it for you.
Don't want Windows spying on your every move? Don't feel like spending hours messing with privacy settings that ultimately still result in data collection? Think your private data belongs to you and no one else? Or maybe you just want a faster PC and don't like all the new 'features' Windows has to offer. Features: Blocks Telemetry Completely; Restores Privacy; Removes W10 Upgrade Nagging; ...
USBLogin allows you to login to your PC by inserting a configured USB stick. USBLogin saves login information in an encrypted manner in a USB stick and you can use it to login to your PC. USBLogin can save logins for different PCs to the same USB stick, as long as the computer name is different. USBLogin can also store credentials used from an existing user to login to another machine, such as a RDP connection.
SpyDetectFree is a FREE tool mainly intended for detecting processes on your computer that might be spying on your keyboard or in other word for detecting processes that might be recording your keystrokes. Just in one click get answers for your questions: Are my keystrokes being recorded? Is there any spyware on my computer? To use SpyDetectFree simply run it and click 'Check Now' button. The whole process takes just 1 minute...
Easy File Locker
Easy File Locker is a light-weight and easy-to-use file lock software product for Windows. It can protect your private files and folders. With its great protection, users will not be able to open, read, modify, delete, move, copy the locked files/folders, or even not be able to see it. The hidden files/folders will be totally invisible to all users and to any program.
Download Easy File Locker
PhishBlock is a security program that detects and blocks Phishing, Pharming, Hacker's C&C (Command and Control) Servers which are located in databases with URLs, DNS hostnames, and IP Addresses. This program detects and blocks Malware URLs, bad Hosts, and bad IP addresses. Generally, virus vaccine programs only detect and block files already existing inside a users' personal computer. But PhishBlock detects and blocks harmful files at the network entrance of personal computers.
BinaryCrypt is a small program that converts regular English text into Binary, Hexadecimal, Decimal, or Octaldecimal code and vice-versa. It can also convert decimal numbers into any base up to base 64 and vice-versa. BinaryCrypt also includes a binary calculator to perform basic arithmetic in binary. You can use as a reference, or you can use it as a simple, and fun encryption scheme.
SimpleKey, as the name suggests, is a very simple program. It can generate a random password, or key up to 500 characters in length using a combination of your choice of Uppercase, Lowercase, numbers, and special characters. You may use this key for any number of things. Simplekey can also hash characters, words, senctences and even files using all of the most popular hashing methods including MD5, Sha512, and Skein1024.
Farbar Recovery Scan Tool
Farbar Recovery Scan Tool, or FRST, is a portable application designed to run on Windows XP, Vista, 7 and 8 in normal or safe mode to diagnose malware issues. It is also possible to run FRST in the Windows Recovery Environment in order to diagnose and fix boot issues. This program will display detailed information about the Windows Registry loading points, services, driver services, Netsvcs entries, known DLLs, drives, and partition specifications. It will also list some important system files that could be patched by malware.
Download Farbar Recovery Scan Tool
ListParts is a small utility that will create a log that contains a listing of all the hard drive partitions on your computer, which can then be posted on the forum that you are receiving help. This tool is useful for diagnosing rootkit infections that create additional hidden partitions on your computer.
GrantPerms is a small portable tool that can be used to check permissions or unlock multiple files and folders. It is useful in cases where malware locks security files and system files and prevent them from running even after the malware is removed.
Secure Archive is a powerful file encryption and compression tool which allows you to encrypt sensitive data and keep it away from unauthorized users while also compressing it so that it will occupy less space on your computer. In addition, the Secure Delete feature allows you to easily remove the original copies of your unencrypted data.
Download Secure Archive
BulletsPassView (the successor of the old 'Asterisk Logger' utility) is a password recovery tool that reveals the passwords stored behind the bullets in the standard password text-box of Windows operating system and Internet Explorer Web browser. After revealing the passwords, you can easily copy them to the clipboard or save them into text/html/csv/xml file.
RogueKiller is an anti-malware program written in C++ and able to detect and remove generic malwares and some advanced threats such as rootkits, rogues, worms, … Based on generic ways to find malwares by their behaviour (heuristics), on classic anti-malware analysis (signature finding) and on undocumented hacks, RogueKiller can find/remove most of the basic malwares (rogues, trojans, …) and some advanced threats like ZeroAccess or TDSS that behave more like rootkits.
Peach Community is a cross-platform fuzzer capable of performing both dumb and smart fuzzing. Peach includes a robust monitoring system allowing for fault detection, data collection, and automation of the fuzzing environment. Peach does not target one specific class of target, making it adaptable to fuzz any form of data consumer. Peach is commonly used to fuzz file formats, network protocols, and APIs. With targets ranging from web browsers and network services through mobile devices, industrial control systems and even down at the silicon level.
Prey is a small, handy, easy to use application specially designed to enable you to keep track of your phone or laptop at all times, and will help you find it if it ever gets lost or stolen. Basically you install a tiny agent in your PC or phone, which silently waits for a remote signal to wake up and work its magic.
Protects your Windows desktop using password, hides desktop icons, application bar, and restricts the mouse movement. For Windows 7, Vista and XP. Note: This application may be detected as a virus but it is a false alarm.
PasswordSpy is a program that will allow you to 'see' the password that is behind the '****' edit boxes. This program is not a 'password cracker.' Instead PasswordSpy takes advantage of several advanced techniques in Windows that allow one program to copy the password from another. This program is not intended for mischievous purposes. PasswordSpy can copy the password from most Windows programs.
PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename.
If you have Waterfox Web browser, you should use the 64-bit version of PasswordFox. (For Firefox Web browser, you should continue using the 32-bit version of PasswordFox, even if your system is 64-bit).
Download PasswordFox 64-bit (For using only with Waterfox!)
Safety Password is an easy to use yet light weight password management software program. You can use this tool to create, manage or save all the passwords in a single or multiple files as you wish!
Download Safety Password
Permanent Delete is a free utility that can be used to delete files/folders permanently so that no software can recover these files. Main Features: Permanently delete files/folders by adding them to the list; Drag and drop is also supported; 1 pass, 3 pass and 7 pass deletion is supported; 1 pass is quick and secure enough and recommended; 3 pass and 7 pass is slow and extremely secure; By secure, it means the ability to recover the file.
Download Permanent Delete
iSpy turns your PC into a full security and surveillance system. iSpy uses your cameras, webcams, IP cams and microphones to detect and record movement or sound. Captured media is compressed to flash video or mp4 and streamed securely over the web and local network. iSpy can run on multiple computers simultaneously and has full Email, SMS and MMS alerting functions and remote viewing.
LastPass is a password manager that makes web browsing easier and more secure. It allows you to create strong passwords, knowing you only have to remember one. LastPass has addons for Internet Explorer, Firefox, Safari, Google Chrome, and works with other browsers with Bookmarklets (Opera). LastPass uses Host Proof Hosting techniques to synchronize your passwords all while LastPass never has access to your sensitive data.
Network Password Recovery
When you connect to a network share on your LAN or to your .NET Passport account, Windows allows you to save your password in order to use it in each time that you connect the remote server. This utility recovers all network passwords stored on your system for the current logged-on user. It can also recover the passwords stored in Credentials file of external drive, as long as you know the last log-on password.
Download Network Password Recovery
Blank And Secure
Blank And Secure is a simple and easy-to-use application that will provide users with the ability of securely deleting their data. Secure delete files are required to block the recovering of deleted data. Secure deletion is possible with this program, because 'Blank And Secure' overwrites the data with zeros before deleting. The data recovery is impossible after this operation. So please only use if the data really should be permanently deleted.
Download Blank And Secure
VSUsbLogon allows to login Windows in a secure way via USB device, replacing the password based Windows login. You don’t need to remember and type your Windows password (but your system is still password protected). Users can be automatically logged into Windows as they insert the USB flash drive into the USB port. VSUsbLogon allows you to use PIN code to login Windows when USB device has been connected. VSUsbLogon supports USB HDD, USB flash drives and other USB devices like iPod, iPhone, Samsung Galaxy...
Polsedit is a freeware utility that allows you to modify user policies such as user account rights and user privileges on a local or remote Windows NT-based system. This can be useful when for some reason you are unable ro run secpol.msc snap-in, for example, XP Home and Vista Home do not have secpol.msc at all. The user interface of Polsedit is very similar to the standard policies editor from Windows, but it also displays some internal data, which can be useful for developers.
It is a virtual disk based encryption tool that runs under Windows. CryptDisk.4h uses a file as virtual logic drive and mounts it as a real one, everything you write to the created virtual disk will be encrypted transparently, virtual disk in effect is a drive volume that is loaded once you have input the correct password.
Cryptohaze is a home of high performance, US-based cross-platform GPU and OpenCL accelerated password auditing tools for security professionals. Cryptohaze tools are aimed at providing high quality tools that run on any platform - Windows, Linux, or OS X. The tools run on all platforms that support CUDA, and the Rainbow Table tools support OpenCL as well for platforms that support any modern device, including CPUs! Cryptohaze is currently also the ONLY GPU based password cracker with support for LM hashes!
The Password Gorilla helps you manage your logins. It stores all your user names and passwords, along with login information and other notes, in a securely encrypted file. A single 'master password' is used to protect the file. This way, you only need to remember the single master password, instead of the many logins that you use. If you want to log in to a service or Web site, the Password Gorilla copies your user name and password to the clipboard, so that you can easily paste it into your Web browser or other application. Because the password does not appear on the screen, Password Gorilla is safe to use in the presence of others.
Download Password Gorilla
SecurStick is a very easy to use application that allows you to encrypt data on USB sticks and other disks. All you have to do is provide the password for the encryption by following a simple set of rules.
VSCryptoHash is a cryptographic hash calculation software. Simply drag and drop files (or type the text) in this calculator and hash string for the files (or for entered text) will be immediately displayed. Great tool for network administrators and webmasters to calculate file control sums. VSCryptoHash supports a variety of cryptographic hash functions, including SHA-1, SHA-256, SHA-384, SHA-512, MD5, MD4 and MD2.
VSEncryptor is an easy to use file and text encryption program. You can encrypt any file or text you choose. To access the file (or text) again, you would need access to the password that was used while encrypting. VSEncryptor is a serious solution, but at the same time is easy to use and does not require any technical background - just select any file (or type text) and choose 'Encrypt' - or simply drag the file to the proper editor box. VSEncryptor supports a variety of encryption algorithms, including AES-128, AES-192, AES-256, RC2, RC4, DES and Triple DES.
Chiave is a small and easy to use software designed to help you encrypt and decrypt files and folders using the 512 Bit Rijndael encryption algorithm. It's written in C# and compiled in .Net version 3.5.
Download Chiave 2
Provides backup capability and offline access for your LastPass vault. All extensions have full offline support. LastPass Portable is recommended over using LastPass Pocket.
Download LastPass Pocket
An open source files' hash calculator for Windows and Mac OS X.
- MD5, SHA1, SHA256 and CRC32.
- Drag and drop.
- Integrated with context menu in Explorer/Finder.
- Support multiple files.
- English and Simplified Chinese UI.
Tom's Hash Explorer
Tom’s Hash Explorer features an innovative Explorer-like graphical user interface to navigate your file system and calculate cryptographic hash values for either a single file or for all files within a folder. The most popular Hash algorithms are supported, including MD5 Message-Digest Algorithm, SHA1 (160-bits), and SHA2 (256 bits, 384-bits, and 512 bits). Its multi-threaded hash computation engine results in extremely fast results.
Download Tom's Hash Explorer
SSIS Multiple Hash
SSIS Multiple Hash makes it possible to generate many Hash values from each input row. Hash's supported include MD5 and SHA1.
Download SSIS Multiple Hash
RapidCRC Unicode is an open source CRC/MD5/SHA hashing program. It supports to allow writing of Unicode .sfv/.md5/.sha1/.sha256/.sha512 files which can be turned on/off through the settings page. Unicode sfv files are written as UTF-16LE with BOM or UTF-8 (with or without BOM), and RCRC now performs a codepage detection.
Download RapidCRC Unicode
A blisteringly fast, no-nonsense file hashing application for Windows, a program that generates and verifies BLAKE2, SHA1 and MD5 hashes; aka. 'MD5 Sums', or 'digital fingerprints'; of a file, a folder, or recursively, even through an entire disk or volume, does it extremely quickly, intelligently, and without fuss.
Febooti Hash & CRC
Simple tool to compute most popular file hash checksums such as MD5, CRC32, SHA-1, SHA-2 and others. Easy to use interface allows to verify file integrity by comparing calculated checksum with a clipboard or checksum files. Integrates natively into Microsoft Windows file properties.
Download Febooti Hash & CRC
QuickSFV was designed with one goal ... to be quick! Existing SFV file verification programs were slow and cumbersome to use. Most users need to verify files and the quicker, the better. QuickSFV integrates into the Windows Explorer shell and makes it very easy to verify files. Just double-click on the .SFV file and QuickSFV does the rest. QuickSFV also understands several other file verification formats including .CRC, .CSV and .CKZ.
IgorWare Hasher is a free SHA-1, MD5 and CRC32 hash generator for Windows. Features: calculate SHA-1 hash, MD5 hash and CRC32 hash for single file or text; supports hash verification files (*.sha, *.md5, *.sfv) compatible with Total Commander and Free Commander; automatically loads verification files when found; supports UTF8 verification files; option to use upper-case or lower-case hash values; ...
Download IgorWare Hasher
WinMD5Checksum is a lightweight hash calculator that can return the MD5 and SHA256 codes for multiple files in your computer. Simply drag and drop the desired files onto the main window of WinMD5Checksum and press the 'Start' button to view the hashes.
CHK is an advanced checksum utility. With this simple and intuitive tool you can easily find duplicate files on your computer, verify downloaded files from the Internet and sign your own files to ensure the integrity! Features: Simple and intuitive interface with Unicode and Drag&Drop support; Wide range of hash functions to choose from: CRC32, ED2K, MD4, MD5, SHA1, SHA1-Base32, SHA256, SHA384, SHA512, SHA3/Keccak512.
Quick Checksum Verifier
Quick Checksum Verifier checks file integrity by secure time proven algorithms like MD5 and SHA-1. You can easily create checksums of files and verify their integrity in the future. The operation is very easy, just two steps. Load the file and paste the predefined checksum.
Download Quick Checksum Verifier