(Page 5 of 84)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >

Category: Utilities

SnortNotify
Added 2007-03-24
by Adam Ely
Running from cron at a specified interval SnortNotify will search a snort database for new alerts. If new alerts match a pre configured priority level, an email will be sent to the contact. The email will include Sensor name, the signaturename, and the timestamp.

Scuba by Imperva
Added 2007-01-05
by Imperva
Scuba by Imperva is a free, lightweight Java tool that scans Oracle, DB2, MS-SQL, and Sybase databases for hundreds of software vulnerabilities. It also detects configuration flaws like insecure passwords, unsafe processes, unrestricted permission levels, and more. Furthermore, it generates HTML and Java reports that show overall security risk level and detailed information about each vulnerability – so you can pinpoint configuration risks within minutes. Scuba by Imperva detects hundreds of database vulnerabilities and configuration issues. And better yet – it helps you meet industry-leading best practices standards for database configuration and management.

Technitium MAC Address Changer v4
Added 2006-12-19
by Shreyas Zare
Technitium MAC Address Changer allows you to change Machine Access Control (MAC) Address of your Network Interface Card (NIC) irrespective to your NIC manufacturer or its driver. It has a very simple user interface and provides ample of information regarding each NIC in the machine. Every NIC has an MAC address hard coded in its circuit by its manufacturer. This hard coded MAC address is used by windows drivers to access Ethernet Networks (LAN). This tool can set a new MAC address to your NIC, bypassing the original hard coded MAC address. Technitium MAC Address Changer is a must tool in every security professionals tool box. Technitium MAC Address Changer v4.0 is coded in Visual Basic 6.0.

WinPassword
Added 2006-11-22
by Vitas Ramanchauskas
WinPassword (formerly known as NT Password) is an application for NT / 2000 / XP / 2003 system administrators for finding breaches in system security. It tries to recover plain-text passwords analyzing user password hashes. If it is possible to recover a password within reasonable time, the password should be considered insecure. WinPassword also can be used to recover lost passwords of particular users. Please note that this program is for advanced users and system administrators with good understanding of NT security model. WinPassword uses both traditional recovery methods (Brute Force Attack, Dictionary Search) and the Smart Table Recovery (TM) technique (based on "Rainbow Tables"), allows recovering long and complex passwords quickly: 7 characters password (all characters) can be recovered in 40 minutes (using Brute Force Attack the password can be recovered in 29 days).

Specops Password Policy
Added 2006-11-16
by Special Operations Software
Specops Password Policy is an advanced password filter that gives you more than one password policy per domain in Windows. Something that Microsoft left out from Windows 2000 and Vista. With Specops Password Policy you can have an unlimited number of password policies per Active Directory domain. Specops Password Policy also increases your password granularity options a lot compared to the built-in password policy settings in Windows.

RiskProfile Tool
Added 2006-10-31
by Perimeter Internetworking
A uniquely powerful self-assessment and security planning tool for financial services institutions by Perimeter Internetworking, the only provider of complete e-security on demand. In a twenty-minute online session, the powerful RiskProfileTM system helps IT and technology executives align security plans and spending with the business risks of their institutions, and provides valuable data benchmarking the user’s results against other institutions.

SafePasswd
Added 2006-10-15
by Robert Accettura
Generate safe, secure and memorable passwords quickly and easily. If a password isn't memorable it isn't used. Also visually displays how effective a password is.

ASDIC
Added 2006-10-13
by Mikael Kuisma
ASDIC is a system for advanced traffic and log analysis. It helps you to determine what traffic there is in your network. You can look at ASDIC as a reverse firewall. Input unstructured traffic information and output a rule set. ASDIC can analyze logs from any firewall or router, or sniff the network by itself.

ServerAngel
Added 2006-10-12
by
A port and vulnerability scanner. Audit what the internet can actually see running on your server. Use your report to harden your services against attack.

sshtools
Added 2006-10-10
by CypherXero
sshtools allows you to parse your ssh logs into data that makes sense. Allows you to view the number of failed logins, block the top 10 failed IP addresses, and build reports based on your logs. Currently, there are eight different options for parsing your ssh logs, and all parsing is done without your login IP Address(s), so that you can see the most important data, which is other people logging in. Plans for sshtools include real-time monitoring and real-time IP blocking, and much more.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus