Koc Attack Scripts

Nimda Attack Log P Linux compatible. Takes any clf(common log format) or similar log file and parses it for nimda requests from an infected computer. With this info., it creates a webpage seperating the requests by monthly totals. Page is easily conf

Author: netkev.com   Category: Error Handling   License: freeware


This mfile simulates the outcome of an attack in the risk game. The number of attackers and defenders may be specified by the user.

Author: Imran Banderker   Category: Games and Entertainment   License: freeware   Size: 10.0 KB


AttackTreeMonkey is an XSLT script that calculates values in an attack tree (using Libxslt or Saxon) and outputs XHTML. Attack trees are a way of modelling security systems and how they fail (see Bruce Schneier in Dr Dobbs Journal; 1999).

Author: a-tree-monkey.berlios.de   Category: Documentation   License: freeware

Protector is a free, open source (GPL), low maintenance e-mail virus blockade system, used mainly to protect MicroSoft windows e-mail client systems from attack, but useful for other client types as well.

Author: Chris Lowth   Category: Email Systems   License: freeware   Size: 225.3 KB

This function uses frequency analysis to attack and decode messagesencoded using a /substitution cipher/ which exchanges each letter of thealphabet for another.

Author: Dafydd Stephenson   Category: Development Tools   License: shareware   Size: 10.0 KB

Game mechanics:-Turn by turn combat-WAIT FOR YOUR TURN TO TYPE A NUMBER OR THE GAME WILL CRASH-3 different gaming level: easy, normal or hard-Chicken can use 4 moves PEAK or CLAW STRIKE and heal or scream-Player can attack, use magic or use items-Bas

Author: Emile B   Category: Development Tools   License: shareware   Size: 20.5 KB

Security Review automates checking many of the configuration errors that lead to an insecure Drupal site and looks for existing vulnerabilities and attack attempts.

Author: Ben Jeavons   Category: phpBB Modules   License: freeware   Size: 20.5 KB

What is Aurora Phishing

Aurora Phishing is an Package with Online Web Services like Facebook, Gmail, Twitter ripped websites used for Phishing Attack.

Author: Aurora-phishing   Category: Front Ends   License: freeware   Size: 318.4 KB

This tools will give early warning when arp attack occurs and simply block the connection

Author: Arpwall   Category: Build Tools   License: freeware

DNAOnline is a web front-end to the DNA (Distributed Network Attack) decryption software from AccessData Corporation. It was developed by the E-Crime Investigative Technologies Lab at FSU and supported in part by NIJ grant 2005-DE-BX-K034.

Author: Dnaonline   Category: User Interfaces   License: freeware   Size: 1.5 MB

This component protect your web forms against the ADOS attack.

Author: Codevalidator   Category: Frameworks   License: freeware

The program supports the Brute-Force attack, dictionary-based attack and dramatically fastest "Booost-Up" attack. The program is able to resume

Author: Intelore   Category: Compression, Encryption   License: shareware

A denial of service attack is possible on

Author: The Apache Software Foundation   Category: Web Servers   License: freeware

A list contains all viruses and a service attack types is included. Search functionalit

Author: Fredrik Elmqvist   Category: Security Systems   License: freeware

XSS attack stands for Cross Site-Scripting attacks. Here the author explains that XSS attackers could inject client side scripting to the web ap

Author: WWWCoder.com   Category: Security Systems   License: freeware

protects against emerging viruses before they attack. Easy-to-use firewall blocks hackers and other unknown threats. and prevent spyware from

Author: Malware Remover   Category: Other   License: shareware   Size: 1.8 MB

OC11-ACANA is the online security system for websites' member area to protect the contents from Brute Force Attack and Account/Password abuse. This system can be used for free.

Author: OC11 Corp.   Category: Security Systems   License: freeware   Size: 10 B

-no angle of attack.-constant burn rate.

Author: abhilash harpale   Category: Development Tools   License: freeware   Size: 10.0 KB

this software use for counting the alphabetic in text file(file.txt).

Author: andi yusuf   Category: Development Tools   License: freeware   Size: 757.8 KB

WorDoG is inspired by the great strategy board game "Risk". Conquer the world.WorDoG is not just a simple copy, but extends the players possibilities to enjoy a more versatile gameplay.

Author: Daniel Pozzi   Category: Games   License: freeware   Size: 583.7 KB

Koc Attack Related Software

In the middle of the cavern big spider won't that you continue with live, this spider eat meat human

The Icons Attack 1.3 is a fun version of the classic Space Invaders but in place of shooting against alien spaceships you shoot against the icons on your desktop that, in a rebellious turn, attack you and you have to eliminate them one by one.

When Icons ATTACK! is a shareware crazy game for Windows. The game features a battlefield; in fact, this field is the typical Windows XP desktop theme.

Turkey Attack is a free Flash shoot'em up game developed by Ultimate Arcade Empire Inc. It is Thanksgiving Day, and you, as a pilgrim, will have to shoot all the turkeys trying to hurt you.

Timez Attack is an educational game that kids can use to practice the multiplication tables. You will help the character you have chosen (a male or female frog) to escape the "Dungeon of Ignurantz".

Learn to read sheet music with this free educational video game. Use either your computer keyboard or MIDI keyboard / piano as input.

Enemies will attack you and the further you go - the stronger the weapons they use against you will be. Bonuses and the store will help you.