• Diniz Martins

Downloads - #1

Here you have some amazing Windows files to celebrate the first year of STENGE.info.


Enjoy it!


HJSplit - Program that can split a file of any type and size into smaller parts. It can also join these parts

back together again to restore the original file.

Download = https://mega.nz/file/rVEWhJ5K#Cyp7mUX8C1m7Eyu7Lr9I9p1EJf_30ixUuKgUScAoSLQ


Havij - Automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page.

Download = https://mega.nz/folder/3FESVJ4S#C20kZ8jMl4J6EQP_rZZtEg

⚠ TAKE CARE


Atomic Email Hunter - Powerful tool that can extract various email addresses with usernames from webpages.

Download = https://mega.nz/file/2cUikb6C#u1ZFFY8EH2i2vcsO5jU0_8pd_2DUc5BcyABhqmCYdIU


LOIC = Open-source network stress testing and denial-of-service attack application, written in C#.

Download = https://mega.nz/file/bUVy3TiZ#D1aa8U3vYsmfRpkOdXOq-ZLQIXJOa2r-dsomz6SavLA

TAKE CARE


Resource Hacker™ = Editor for 32bit and 64bit Windows® applications.

Download = https://mega.nz/file/zEVgkTYI#oTdRj51b2svfXWonrMT_q0rfZt8lrtzefGzG0gMScXU


Virtual Router:

Cisco - csr1k = https://mega.nz/file/mMEUSBgC#1jWWnWKKK4RIjljDQESQlw1ftOoqI-ZsRIyHjxI2XNU

Cisco - n1000v = https://mega.nz/file/zNcGwJAS#QUJgp93Jf-z2CvxmY20-TrOe48LVIRLyHGFNbJ987p4


HashCalc - It is used for computing HMACs, messages digests, and checksums for files.

Download = https://mega.nz/folder/CNEV2aLJ#2-OVrFtO1tDQ6yAFcum9wg


EaseUS Data Recovery - Recover the Lost, Deleted, Formatted, Corrupt Drive Files Completely & Easily.

Download = https://mega.nz/folder/WEUmARxI#PljszN4w9SN4l7Gsvr28_g


Process Monitor - An advanced monitoring tool for Windows that shows real-time file system, Registry and process/thread activity.

Download = https://mega.nz/folder/uVc2nTiT#5QCF0Wr2185EWEAAoA185w


PdfStreamDumper - Analyzing Suspicious PDF Files.

Download = https://mega.nz/folder/PAlEnYYR#cpJ_8JjnNv67PU53HA0mvw


IDA - IDA has become the de-facto standard for the analysis of hostile code, vulnerability research and commercial-off-the-shelf validation.

Download = https://mega.nz/folder/2B1ChCiK#XhkKjaSBBORx7UALC1tOUg


RegScanner - Small utility that allows you to scan the Registry, find the desired Registry values that match to the specified search criteria, and display them in one list.

Download = https://mega.nz/folder/vYMSQL5T#ApARuLyh_2pmdpRcs_89bw


eMailTrackerPro - Recipient Geographics. Find out where your email recipients are located. Get their country, city, ISP, internet type, coordinates, and postal area when available.

Download = https://mega.nz/folder/jA00QAgY#m9zOPVkRyQ8u7FOaQr-NXw


NetworkMiner - It is an open source Network Forensic Analysis Software (NFAT) for Windows

Download = https://mega.nz/file/XRkDRQ7C#mkQoaQ97yYFZwlNBnrp8LuLqoYyf01xNYXACD6c3Msc


Spoofer - Source address validation measurement program that measures susceptibility to spoofed source address IP packets.

Download = https://mega.nz/file/PAtyxKrB#r3jUXVD_OiEMkE1tPt_-zvzxnNXMEp2TiGs323XrKRQ


HijackThis - Inspects a computer’s browser and operating system settings to generate a log file of its current state.

Download = https://mega.nz/file/aUsVxQgD#RNbwmuea8kEewpH0wdMxzGjo6ONYLPmm8T9EvJWn8YI


Fiddler - Web Debugging Proxy which logs all HTTP(S) traffic between your computer and the Internet.

Download = https://mega.nz/file/mEt0zIqA#3OXrFHV-OTUXgiBDEPPFOQ1eeJneZA575B0csqGzy7k



Recent Posts

See All

D-TECT | Pentest the Modern Web

D-TECT is a penetration testing tool that can be used for information gathering and finding vulnerabilities in web applications. The types of vulnerabilities that can be detected of D-TECT tool includ

WSL | NMAP not work!

Ever since the release of the Windows Subsystem for Linux, a years long unfulfilled hope of using Nmap in this environment still lingers. You can install Nmap (sudo apt-install nmap) in Bash but when

SQLMap

SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection eng