(Page 2 of 22)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >

Platform: NetBSD

Added 2008-08-05
by Applicure Technologies
dotDefender provides plug-and-play protection against SQL Injection, Cross-site scripting, Path Traversal, and many other application attacks. Web server security is achieved by rapid deployment of dotDefender™ as a software plug-in. Residing on the web server, dotDefender can be installed and implemented in minutes without influence on traffic or network architecture. The dotDefender™ website protector comes with a predefined set of internet security rules for out of the box best practices website protection. Automatic live update ensures website security that is ready to counter the latest malicious attacks.

syslog-ng Premium Edition
Added 2007-08-10
by BalaBit IT Security
The syslog-ng Premium Edition application is a system logging client and server application that offers native TCP and TLS support, disk buffering, and logging directly into SQL databases. It runs on a variety of UNIX-like systems, and can also collect logs from Microsoft Windows platforms.

Added 2007-03-24
by Adam Ely
Running from cron at a specified interval SnortNotify will search a snort database for new alerts. If new alerts match a pre configured priority level, an email will be sent to the contact. The email will include Sensor name, the signaturename, and the timestamp.

Source Security
Added 2007-01-15
sourcesec.com provides Web-based access to code auditing applications, and was created to assist developers and users in auditing their programs for vulnerabilities. You can upload your code for static analysis by RATS, Flawfinder and ITS4 as applicable - the C/C++, PHP Python and Perl languages are supported. Additionally, a simplified search function is available which easily allows efficient Web searches for security-related information.

Added 2006-10-15
by Robert Accettura
Generate safe, secure and memorable passwords quickly and easily. If a password isn't memorable it isn't used. Also visually displays how effective a password is.

Added 2006-10-10
by CypherXero
sshtools allows you to parse your ssh logs into data that makes sense. Allows you to view the number of failed logins, block the top 10 failed IP addresses, and build reports based on your logs. Currently, there are eight different options for parsing your ssh logs, and all parsing is done without your login IP Address(s), so that you can see the most important data, which is other people logging in. Plans for sshtools include real-time monitoring and real-time IP blocking, and much more.

Added 2006-09-16
by CypherXero
md5tables is a shell script that references a wordlist of md5 hashes and words for password auditing. It can crack MD5 hashes from a wordlist of hashes/words in mere seconds.

Added 2006-06-06
by SuRGeoN
Download cisco configuration file. Bypassing the SNMP access-list (ip spoof).

Added 2006-05-12
by Daniel B. Cid
OSSEC HIDS is an Open Source Host-based Intrusion Detection System. It performs log analysis and correlation, integrity checking, rootkit detection, time-based alerting and active response. It runs on most operating systems, including Linux, OpenBSD, FreeBSD, Solaris and Windows.

Added 2006-05-06
by GomoR
SinFP is a new approach to OS fingerprinting, which bypasses limitations that nmap has.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus