(Page 8 of 23)   < Prev  3 4 5 6 7 8 9 10 11 12 13  Next >

Category: Network Utilities » Miscellaneous

K9
Added 2002-10-07
by ROBOTA
K9 is a Windows tool for passive OS detection. It uses WinPCAP to capture network traffic and a user friendly interface to handle results, fingerprint database, etc

Reapoff
Added 2002-08-27
by scudette
Reapoff (Regular Expression, Arbitrary Protocol, Opensource Filtering Firewall) is a regular expression enabled TCP/IP proxy. It operates on data using a pair of simple rule- based configuration files defining the tests and actions to perform on data. It can also sign SSL connections transparently (with MITM), applying a security policy to encrypted SSL sessions that would otherwise be allowed unchecked. The proxy forms the core part of an overall firewall solution designed to run from a RAM disk using Trinux.

HTun
Added 2002-08-14
by Moshe Jacobson
HTun is a VPN (Virtual Private Network) interface that allows you to create a fully bidirectional IP-layer VPN over an HTTP proxy or just over port 80, allowing you to bypass restrictive firewalls and use any IP-based service you desire.

Geolizer
Added 2002-08-13
by Stanislaw Y. Pusep
Geolizer is a patch for Webalizer to generate faster and more reliable geographic statistics than using the default DNS suffix method. It uses the GeoIP library. If you disable DNS reverse lookups on your HTTP server, it will work faster and your stats will be more accurate when processed by a patched Webalizer.

Secure Cryptographic Instant Messaging
Added 2002-08-07
by The Project SCIM team
The Project SCIM application allows you to send Encrypted Instant Messages to your friends and other contacts. The software is free for non-commercial users and contains a load of cool features.

echolot-pinger
Added 2002-07-23
by Peter Palfrader (Weasel)
Echolot-pinger is a pinger for anonymous remailers, which works by regularly sending messages through remailers to check their reliability. It then calculates reliability statistics which are used by remailer clients to choose the chain of remailers to use. Additionally, it collects configuration parameters and the keys of all remailers, and offers them in a format readable by remailer clients.

PALA
Added 2002-07-03
by Anders K. Madsen
PALA (PHP Agent Log Analyzer) is a small and simple useragent-logger and analyzer. It can generate statistics over both OSes and browsers. It doesn't support standard Apache useragent logs, but it has its own logger included.

DNeye
Added 2002-07-03
by digitalnerds
DNeye is a Linux kernel module that attempts to improve the security of your box by recovering and cleaning the system after being compromised with a root kit LKM. It prevents most of the known exploits and adds privacy procfs tricks in order to prevent users from seeing each other or other processes. It is cleans and recovers from known and unknown root kits, including SucKIT.

Log4Py
Added 2002-07-03
by Martin Preishuber
Log4Py is a logging module for Python programmers that is similar to log4j. It supports various debug levels, configurable output, and debugging information such as line-numbers or tracebacks.

WPSweep
Added 2002-07-02
by Arne Vidstrom
WPSweep is a simple ping sweeper, that is, it pings a range of IP addresses and lists the ones that reply. More information can be found in the WPSweep FAQ.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus