(Page 1 of 62)   1 2 3 4 5 6 7 8 9 10 11  Next >

Category: Network Utilities

Kippo
Added 2010-03-02
by Upi Tamminen
Kippo is a medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by the attacker.

vTrace
Added 2010-02-11
by Arkadiusz Nowicki
Very simple visual traceroute, whois, nslookup, ping, netstat with GeoIP localization

HomeSeer to Elk M1 Monitoring
Added 2010-01-07
by ceaves
Provides access to the Elk M1 monitoring console via the HomeSeer interface. Download link towards end of page.

Katana: Portable Multi-Boot Security Suite
Added 2009-11-25
by .ronin
Katana v1 (Kyuzo) has just been released from www.hackfromacave.com . The Katana: Portable Multi-Boot Security Suite is designed to fulfill many of your computer security needs. The idea behind this tool is to bring together many of the best security distributions and applications to run from one USB Flash Drive. Instead of keeping track of dozens of CDs and DVDs loaded with your favorite security tools, you can keep them all conveniently in your pocket. Katana includes distributions which focus on Penetration Testing, Auditing, Password Cracking, Forensics and Honey Pots. Katana comes with over 100 portable Windows applications, such as Wireshark, HiJackThis, Unstoppable Copier, Firefox, and OllyDBG. It also includes the following distributions: - Backtrack 4 pre - the Ultimate Boot CD - Ophcrack Live - Damn Small Linux - the Ultimate Boot CD for Windows - Got Root? Slax - Organizational Systems Wireless Auditor (OSWA) Assistant - Damn Vulnerable Linux Katana is also highly customizable. You can modify Katana by adding or removing distributions and portable apps with ease. You can add functionality to distributions like the Ultimate Boot CD, Got Root? Slax and UBCD4Win. You can also load your personal scripts and documents to keep them conveniently with you on your flash drive to use in concert with the provided tools. More informations on this can be found at forum.hackfromacave.com

iodine
Added 2009-06-26
by Erik Ekman, Bjorn Andersson
iodine lets you tunnel IPv4 data through a DNS server. This can be usable in different situations where Internet access is firewalled, but DNS queries are allowed. It needs a TUN/TAP device and one server can handle 16 simultaneous users. The bandwidth is asymmetrical with limited upstream and up to 1 Mbps downstream.

ASDIC
Added 2009-06-07
by Mikael Kuisma
ASDIC is a system for advanced traffic analysis. It helps you to investigate the traffic in your network by parsing firewalls logs and/or sniffing the network. Detects anomalies, identifies patterns and presents graphical reports.

NetworkMiner
Added 2009-05-21
by
NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows that can detect the OS, hostname and open ports of network hosts through packet sniffing or by parsing a PCAP file. NetworkMiner can also extract transmitted files from network traffic.

httpsScanner
Added 2009-05-14
by Chan Fook Sheng
httpsScanner is a Java program that will scan a web server to test the strength of the SSL

WPSpy
Added 2009-05-14
by
WPSpy is a tool to simply monitor and report changes in the WiFi Protected Setup status of and access point. This is particularly useful if you are running attacks against WPS.

WiFinger
Added 2009-05-14
by SourceSec Security Research
WiFinger passively identifies wireless access points based on matching the Information Elements in their beacon packets against a fingerprint database. It is written in Python and uses Scapy, and has been tested in Linux.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus