(Page 5 of 7)   < Prev  1 2 3 4 5 6 7  Next >

Platform: SCO

cgiscan
Added 2001-10-22
by Bronc Buster
cgiscan.c is another simple program which facilitates the scanning of hosts on a network for known cgi vulnerabilities. It let's the user know whether or not a given cgi was found on the host.

Checker
Added 2001-10-22
by David Lyer
Checker will scan a set of IP addresses for a configurable set of ports, and generate a report detailing what is and is not running properly. The output is highly configurable, and allows for the mailing of the results to a specifiable address.

findomains.c
Added 2001-10-22
by Paul McGinnis
findomains.c is a simple program to find the names associated with a class C worth of IP's.

fts-rvscan
Added 2001-10-22
by ben-z
rvscan is a remote vulnerability scanner. It checks for a number of recent remote vulnerabilities in a variety of Unixes. Unlike most commercial scanners, it uses real exploits to check for the vulnerabilities.

Subinfo
Added 2001-10-22
by Corey Satten
Subinfo is a shell script which utilizes nslookup to dump all information about a domain, and its subdomains.

Courtney
Added 2001-10-22
by Marvin J. Christensen
Courtney is a "ids" system, which monitors for SATAN probes and attacks. It receives its input from tcpdump, counting the number of new services a machine originates within a time window. If the threshold is exceeded by a host, it is flagged as a potential SATAN host.

Flog ftpd log analyzer
Added 2001-10-22
by Ani Joshi
Flog is a simple ftpd log file analysis tool. It generates basic statistics about traffic and server utilization, which it outputs to a file.

TCFS
Added 2001-10-22
by TCFS Group - University of Salerno
TCFS is a Transparent Cryptographic File System that is a suitable solution to the problem of privacy for distributed file system. By a deeper integration between the encryption service and the file system, it results in a complete trasparency of use to the user applications. Files are stored in encrypted form and are decrypted before they are read. The encryption/decryption process takes place on the client machine and thus the encryption/decryption key never travels on the network.

Cfdecrypt
Added 2001-10-22
by Matt Chapman
CFDECRYPT: Decrypt Cold Fusion templates encrypted with CFCRYPT

fping
Added 2001-10-22
by RL "Bob" Morgan, Roland J. Schemers III
fping is a ping(1) like program which uses the Internet Control Message Protocol (ICMP) echo request to determine if a host is up. fping is different from ping in that you can specify any number of hosts on the command line, or specify a file containing the lists of hosts to ping. Instead of trying one host until it timeouts or replies, fping will send out a ping packet and move on to the next host in a round-robin fashion. If a host replies, it is noted and removed from the list of hosts to check. If a host does not respond within a certain time limit and/or retry limit it will be considered unreachable.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus