networx-prev
NetWorx
Description: NetWorx is a simple and free, yet powerful tool that helps you objectively evaluate your bandwidth situation. You can use it to collect bandwidth usage data and measure the speed of your Internet or any other network connection. NetWorx can help you identify possible sources of network problems, ensure that you do not exceed the bandwidth limits specified by your ISP, or track down suspicious network activity characteristic of Trojan horses and hacker attacks.

images-17
Web of Trust
Description: In addition to viruses and malware, phishing, scams, bad online shopping experiences, and untrustworthy content are becoming increasingly widespread threats on the web. They can only be identified by human experience.

WOT widens the scope of Web safety from purely technical security to helping people find sites that they can actually trust. Based on ratings from millions of web users and trusted technical sources, WOT calculates the reputation for websites, using traffic light-style icons displayed via search results, social media platforms, webmail, and many popular sites. Green indicates a trustworthy site, yellow tells users that they should be cautious, while red indicates a potentially dangerous site.

homelogo
N-Stalker®
Description: N-Stalker® was created in April 2000 by information security technology specialists, aiming at providing solutions to protect corporations and individuals against digital threats that affect information systems. Since then, our research & development laboratory has been working non-stop on security researches, producing web attack detection controls for the past years.

 

logo_small
Kismet
Description: Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and (with appropriate hardware) can sniff 802.11b, 802.11a, 802.11g, and 802.11n traffic. Kismet also supports plugins which allow sniffing other media such as DECT. Kismet identifies networks by passively collecting packets and detecting standard named networks, detecting (and given time, decloaking) hidden networks, and infering the presence of nonbeaconing networks via data traffic.

tor-logo
Tor
Description: What is Tor? Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis

gpsd-logo-small
gpsd
Description: gpsd is a service daemon that monitors one or more GPSes or AIS receivers attached to a host computer through serial or USB ports, making all data on the location/course/velocity of the sensors available to be queried on TCP port 2947 of the host computer.

aircrack-ng-new-logo
Aircrack-ng
Description: Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, Aircrack-ng is a set of tools for auditing wireless networks.

After_the_Deadline
After the Deadline
Description: You’ll write better and spend less time editing. After the Deadline is a language checker for the web with: Contextual Spell Checking, Advanced Style Checking and Intelligent Grammar Checking. It uses artificial intelligence and natural language processing technology to find your writing errors and offer smart suggestions. The technology is available under the GNU General Public License.

juice
Juice
Description: Want to listen to internet audio programs but can’t when they are scheduled? This program lets you create your own custom online audio anytime, anywhere. Really.

FrostWire
FrostWire
Description: Be safe and download the official FrostWire installer from the original source. FrostWire is a high quality and totally FREE file sharing app. Rated the Best File Sharing app in the world. Play, Search and Browse files locally and over the Internet using BitTorrent and the Cloud.

open source

Open Source Mac
Description: Free and open-source software is good for you and good for the world. This is the best free Mac software that we know of.

Also check out open source for windows at:
Open Source Windows
and open source security software at:
Best Privacy Tools

NMAP
NMAP

Description: NMAP (“Network Mapper”) is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), a utility for comparing scan results (Ndiff), and a packet generation and response analysis tool (Nping).

ziPhone
ziPhone
Description: ziPhone is a free, open source and all-in-one jailbreak / unlocking tool for iPhone and iPod Touch. The latest version of the unlocking software supports the new v2.0 iPhone OS and more international networks. The developer warns users not to upgrade to iPhone 2.0 firmware when it’s made available if they want to have fun with their iPhones.

John The Ripper

John the Ripper password cracker
Description: John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix systems, supported out of the box are Windows LM hashes, plus lots of other hashes and ciphers in the community-enhanced version.

Cain and Abel

Cain & Able Passwords Cracker
Description: Its another password cracker for windows based system. P It collects passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, uncovering cached passwords, revealing password boxes,and analyzing routing protocols.

WireShark
WireShark
Description: WireShark was formerly knows as Eathereal. It  is  network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. Its open sources’ness gives it to grow from all dimensions & it gives more than a quality network analyzers that are present in the market.

MarsEdit3
Mars Edit 3
Description: Browser-based interfaces are slow, clumsy, and require you to be connected to the internet just to use them. Browsers are perfect for reading web content, but not so great for creating it. If you’re serious about your blog, you need a desktop blog editor. If you’re lucky enough to have a Mac, nothing is more powerful or more elegant than Mars Edit 3.