< Prev 5 6 7 8 9 10 11 12 13 14 15 Next >
WebProxy 1.0 is a cross-platform/browser security tool for use in auditing web sites. Installed as a proxy for your browser, WebProxy allows you to intercept, modify, log, and re-submit requests, both HTTP and HTTPS. Editing capabilities include parsing of query parameters, request headers, and POST parameters, as well as cookie editing. The convenient "browse from here" capability allows you to edit and resubmit previous requests and continue browsing on from the returned page. Request interception allows on-the-fly editing of requests based on a matching regular expression. There is also dynamic certificate generation. Use WebProxy for SQL injection, cookie manipulation, parameter testing, or simply monitoring of requests.
Reliable SSH Tunnel
RSTunnel (Reliable SSH Tunnel) allows you to tunnel through data between two networks in a secure and encrypted tunnel. It uses SSH to connect the two machines. This will setup a tunnel for you, and make sure that it's constantly running.
Various tools relating to the Simple Network Management Protocol including: - An extensible agent - An SNMP library - tools to request or set information from SNMP agents - tools to generate and handle SNMP traps - a version of the unix 'netstat' command using SNMP - a Tk/perl mib browser This package was originally based on the Carnegie Mellon University SNMP implementation, but has been greatly enhanced, ported, fixed, made easier to use and barely resembles the original package anymore.
NFSWATCH allows for the monitoring of NFS requests to any given machine, or an entire local area network. It monitors mostly NFS client traffic. It also monitors the NFS reply traffic from a server in order to measure the response time for each RPC.
Distributed DNS Flooder v0.1b Powerful attack against DNS servers.
OpenRADIUS is a RADIUS server that allows you to use external data sources for anything - shared secrets, accounts and passwords, profiles, session database, NAS lists, called/calling nr. ACLs, accounting storage, and much more. It has a powerful external module interface that uses pre-spawned subprocesses and pipes for communication, allowing you to implement modules in any language that supports Unix pipe I/O. Its behaviour is fully configurable, using a built-in business rule language, which gives you full control over the request and reply list. It includes a versatile LDAP gateway module and a full featured RADIUS client.
The EDDIE Tool
The EDDIE Tool is a system monitoring, security, and performance analysis tool developed entirely in Python. Its key features are portability, powerful configuration, and ease of expansion.
Squid is a high-performance proxy caching server for web clients, supporting FTP, gopher, and HTTP data objects. Unlike traditional caching software, Squid handles all requests in a single, non-blocking, I/O-driven process. Squid keeps meta data and especially hot objects cached in RAM, caches DNS lookups, supports non-blocking DNS lookups, and implements negative caching of failed requests. Squid supports SSL, extensive access controls, and full request logging. By using the lightweight Internet Cache Protocol, Squid caches can be arranged in a hierarchy or mesh for additional bandwidth savings. Squid consists of a main server program squid, a Domain Name System lookup program dnsserver, some optional programs for rewriting requests and performing authentication, and some management and client tools. When squid starts up, it spawns a configurable number of dns server processes, each of which can perform a single, blocking Domain Name System (DNS) lookup. This reduces the amount of time the cache waits for DNS lookups.
integrit is an alternative to file integrity verification programs like tripwire and aide. It helps you determine whether an intruder has modified a computer system. integrit's major advantages are a small memory footprint and simplicity. It works by creating a database that is a snapshot of the most essential parts of your computer system. You put the database somewhere safe, and you can then use it to make sure that no one has made any illicit modifications to the computer system. In the case of a break in, you know exactly which files have been modified, added, or removed.
NBTscan is a program for scanning IP networks for NetBIOS name information. It sends NetBIOS status query to each address in supplied range and lists received information in human readable form. For each responded host it lists IP address, NetBIOS computer name, logged-in user name and MAC address.
Browse by category