120 private links
https://avepdf.com
https://www.ilovepdf.com/
Every tool you need to work with PDFs in one place
Free/Libre Open Source Software Binaries of VSCode
Microsoft’s vscode source code is open source (MIT-licensed), but the product available for download (Visual Studio Code) is licensed under this not-FLOSS license and contains telemetry/tracking. According to this comment from a Visual Studio Code maintainer
Syslog Watcher installs a dedicated syslog server, integrating log data from multiple network devices into a single, easily manageable and accessible place. Collecting and analyzing syslogs is essential for maintaining network stability and auditing network security.
EventLog Inspector, a cost-effective tool for system administrators to extend Windows event log management. The tool provides administrators the ability to translate event log events to a syslog server or forward the events to a specified email address.
urlscan.io is a service to scan and analyse websites. When a URL is submitted to urlscan.io, an automated process will browse to the URL like a regular user and record the activity that this page navigation creates. This includes the domains and IPs contacted, the resources (JavaScript, CSS, etc) requested from those domains, as well as additional information about the page itself. urlscan.io will take a screenshot of the page, record the DOM content, JavaScript global variables, cookies created by the page, and a myriad of other observations.
Finally, urlscan.io will try to make a verdict whether the scanned website is considered malicious or suspicious. If the site is targeting the users one of the almost 400 brands tracked by urlscan.io, this will be shown in the scan results.
This is a file share allowing access to all Sysinternals utilities. We have developed this to test an alternate distribution mechanism for our utilities. This will allow you to run these tools from any computer connected to the Internet without having to navigate to a webpage, download and extract the zip file. If you are unfamiliar with Microsoft Windows Sysinternals, it is highly recommended that you visit the website at http://technet.microsoft.com/sysinternals before using these tools. If you have any questions or comments on this file share, please email syssite@microsoft.com
Convert web pages into
professionally looking RSS feeds.
DNS & IP Tools provide tactical intelligence to Security Operations (SOCS). Penetration Testers use the tools to map the attack surface of a target. Blue teams benefit from quickly identifying areas of security weakness and during incident response. Collect information about IP Addresses, Networks, Web Pages and DNS records.
The Sysinternals web site was created in 1996 by Mark Russinovich to host his advanced system utilities and technical information. Whether you’re an IT Pro or a developer, you’ll find Sysinternals utilities to help you manage, troubleshoot and diagnose your Windows systems and applications.
Read the official guide to the Sysinternals tools, Troubleshooting with the Windows Sysinternals Tools
Read the Sysinternals Blog for a detailed change feed of tool updates
Watch Mark’s top-rated Case-of-the-Unexplained troubleshooting presentations and other webcasts
Read Mark’s Blog which highlight use of the tools to solve real problems
Check out the Sysinternals Learning Resources page
Post your questions in the Sysinternals Forum
Sysinternals Live
Sysinternals Live is a service that enables you to execute Sysinternals tools directly from the Web without hunting for and manually downloading them. Simply enter a tool's Sysinternals Live path into Windows Explorer or a command prompt as live.sysinternals.com/<toolname> or \live.sysinternals.com\tools\<toolname>.
You can view the entire Sysinternals Live tools directory in a browser at
tools to admin
Backups
Cloning
Cloud Computing
Cloud Storage
Code Review
Collaborative Software
Configuration Management Database
Configuration Management
Continuous Integration & Continuous Deployment
Distributed Filesystems
DNS
Hosting Control Panels
IMAP/POP3
IT Asset Management
LDAP
Log Management
Monitoring
Metric & Metric Collection
Network Configuration Management
Newsletter
NoSQL
Packaging
Queuing
RDBMS
Security
Service Discovery
SMTP
Software Containers
SSH
Statistics
Ticketing systems
Troubleshooting
Project Management
Version control
Virtualization
VPN
XMPP
Web
Webmails
Wikis
Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), a utility for comparing scan results (Ndiff), and a packet generation and response analysis tool (Nping).
canivete suiço never more?