(Page 6 of 125)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >

Category: Auditing

Strata Guard
Added 2006-12-04
by StillSecure
Strata Guard is an award-winning family of network-based intrusion detection/prevention systems (IDS/IPS) that provide real-time, zero-day protection from network attacks and malicious traffic. With four different models and two deployment options, Strata Guard protects enterprise businesses from the network perimeter to the core, including remote and internal segments.

ADManager Plus
Added 2006-11-14
by AdventNet
ManageEngine ADManager Plus is a 100% web-based product that simplifies enterprise-wide Windows Active Directory management from a central point. The ADManager Plus, with its ease-of-use, intuitive UI, eliminates the need of using command line tools and scripts to manage the Active Directory. It saves the administrator's time with its integrated management and reporting module.

pyctd
Added 2006-11-09
by INL SARL
pyctd is a XML-RPC service for monitoring and altering Netfilter connections for network admins. It has the following functionnalities : * Connections listing (with byte rate of connections) * Entries removal * Modification of mark and timeout pyctd is a free software released under GNU General Public License. By using XML-RPC, frontends can be easily built. A PHP frontend is already available.

ASDIC
Added 2006-10-13
by Mikael Kuisma
ASDIC is a system for advanced traffic and log analysis. It helps you to determine what traffic there is in your network. You can look at ASDIC as a reverse firewall. Input unstructured traffic information and output a rule set. ASDIC can analyze logs from any firewall or router, or sniff the network by itself.

ServerAngel
Added 2006-10-12
by
A port and vulnerability scanner. Audit what the internet can actually see running on your server. Use your report to harden your services against attack.

Taof - the art of fuzzing
Added 2006-10-11
by Rodrigo Marcos
Taof is a GUI cross-platform Python generic network protocol fuzzer. It has been designed for minimizing set-up time during fuzzing sessions and it is especially useful for fast testing of proprietary or undocumented protocols. Taof aids the researcher during the data retrieval process by providing a transparent proxy functionality that forwards and logs requests from a client to a server. After the data retrieval phase, Taof presents the logged requests and allows the user to specify the fuzzing points within the requests.

Tenshi
Added 2006-09-29
by Andrea Barisani
tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expressions and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.

md5tables
Added 2006-09-16
by CypherXero
md5tables is a shell script that references a wordlist of md5 hashes and words for password auditing. It can crack MD5 hashes from a wordlist of hashes/words in mere seconds.

LAPSE
Added 2006-09-14
by Benjamin Livshits
LAPSE is designed to help with the task of auditing Java J2EE applications for common types of security vulnerabilities found in Web applications. LAPSE is inspired by existing lightweight security auditing tools such as RATS, pscan, and FlawFinder. Unlike those tools, however, LAPSE addresses vulnerabilities in Web applications. LAPSE is not intended as a comprehensive solution for Web application security, but rather as an aid in the code review process.

SpoofMAC
Added 2006-09-14
by Socketsoft.net
SpoofMAC is a powerful, easy to use and intuitive MAC Address Changing (Spoofing) Tool for Windows systems. Includes Command-line Scripting, IPConfig and automatic spoofing tools. SpoofMAC allows users to change the MAC Address of Network Adapters on Windows 2000, XP and 2003 Server systems. SpoofMAC helps people protect their privacy by hiding their MAC Address and helps IT Professionals test network security and recover MAC Address based software licenses. SpoofMAC was developed by certified IT Security and Software Development professionals.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus