(Page 5 of 7)   < Prev  1 2 3 4 5 6 7  Next >

Platform: True64 UNIX

fping
Added 2001-10-22
by RL "Bob" Morgan, Roland J. Schemers III
fping is a ping(1) like program which uses the Internet Control Message Protocol (ICMP) echo request to determine if a host is up. fping is different from ping in that you can specify any number of hosts on the command line, or specify a file containing the lists of hosts to ping. Instead of trying one host until it timeouts or replies, fping will send out a ping packet and move on to the next host in a round-robin fashion. If a host replies, it is noted and removed from the list of hosts to check. If a host does not respond within a certain time limit and/or retry limit it will be considered unreachable.

GCC Bounds Checking Extensions
Added 2001-10-22
by Herman ten Brugge


Jonama
Added 2001-10-22
by Gomez Henri
Jonama is a network relay, that utilizes SSL to authenticate and encrypt connections between two points. It uses SSL v2/v3/TLS from SSLeay or OpenSSL. In addition, it contains a CA mode to allow it perform access control based on certificates.

Chrootuid
Added 2001-10-22
by Weitse Venema
Chrootuid is a wrapper program designed to protect hosts from network compromise. By running a daemon under the chrootuid wrapper, if the daemon results in a remote compromise, the access acquired will be severely limited. Chrootuid utilizes the chroot() mechanism to allow the daemon to run in its own, contained sand box. If an attacker gains access to a host via a chroot'ed daemon, they will only have access to a specific subset of tools and capabilities, as provided in the chroot directory set by the wrapper.

CU Sudo
Added 2001-10-22
by Todd Miller
Sudo is a utility that allows administrators to give limited access to root privileges to users, and log activity associated with the use of sudo. This allows for giving people the access they need, without the need to give full root access.

cgiscan
Added 2001-10-22
by Bronc Buster
cgiscan.c is another simple program which facilitates the scanning of hosts on a network for known cgi vulnerabilities. It let's the user know whether or not a given cgi was found on the host.

Checker
Added 2001-10-22
by David Lyer
Checker will scan a set of IP addresses for a configurable set of ports, and generate a report detailing what is and is not running properly. The output is highly configurable, and allows for the mailing of the results to a specifiable address.

findomains.c
Added 2001-10-22
by Paul McGinnis
findomains.c is a simple program to find the names associated with a class C worth of IP's.

fts-rvscan
Added 2001-10-22
by ben-z
rvscan is a remote vulnerability scanner. It checks for a number of recent remote vulnerabilities in a variety of Unixes. Unlike most commercial scanners, it uses real exploits to check for the vulnerabilities.

Subinfo
Added 2001-10-22
by Corey Satten
Subinfo is a shell script which utilizes nslookup to dump all information about a domain, and its subdomains.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus