(Page 5 of 7)   < Prev  1 2 3 4 5 6 7  Next >

Platform: SCO

Added 2001-10-22
by Bronc Buster
cgiscan.c is another simple program which facilitates the scanning of hosts on a network for known cgi vulnerabilities. It let's the user know whether or not a given cgi was found on the host.

Added 2001-10-22
by David Lyer
Checker will scan a set of IP addresses for a configurable set of ports, and generate a report detailing what is and is not running properly. The output is highly configurable, and allows for the mailing of the results to a specifiable address.

Added 2001-10-22
by Paul McGinnis
findomains.c is a simple program to find the names associated with a class C worth of IP's.

Added 2001-10-22
by ben-z
rvscan is a remote vulnerability scanner. It checks for a number of recent remote vulnerabilities in a variety of Unixes. Unlike most commercial scanners, it uses real exploits to check for the vulnerabilities.

Added 2001-10-22
by Corey Satten
Subinfo is a shell script which utilizes nslookup to dump all information about a domain, and its subdomains.

Added 2001-10-22
by Marvin J. Christensen
Courtney is a "ids" system, which monitors for SATAN probes and attacks. It receives its input from tcpdump, counting the number of new services a machine originates within a time window. If the threshold is exceeded by a host, it is flagged as a potential SATAN host.

Flog ftpd log analyzer
Added 2001-10-22
by Ani Joshi
Flog is a simple ftpd log file analysis tool. It generates basic statistics about traffic and server utilization, which it outputs to a file.

Added 2001-10-22
by TCFS Group - University of Salerno
TCFS is a Transparent Cryptographic File System that is a suitable solution to the problem of privacy for distributed file system. By a deeper integration between the encryption service and the file system, it results in a complete trasparency of use to the user applications. Files are stored in encrypted form and are decrypted before they are read. The encryption/decryption process takes place on the client machine and thus the encryption/decryption key never travels on the network.

Added 2001-10-22
by Matt Chapman
CFDECRYPT: Decrypt Cold Fusion templates encrypted with CFCRYPT

Added 2001-10-22
by RL "Bob" Morgan, Roland J. Schemers III
fping is a ping(1) like program which uses the Internet Control Message Protocol (ICMP) echo request to determine if a host is up. fping is different from ping in that you can specify any number of hosts on the command line, or specify a file containing the lists of hosts to ping. Instead of trying one host until it timeouts or replies, fping will send out a ping packet and move on to the next host in a round-robin fashion. If a host replies, it is noted and removed from the list of hosts to check. If a host does not respond within a certain time limit and/or retry limit it will be considered unreachable.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus