(Page 1 of 31)   1 2 3 4 5 6 7 8 9 10 11  Next >

Category: Network Utilities » Monitoring

Kippo
Added 2010-03-02
by Upi Tamminen
Kippo is a medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by the attacker.

HomeSeer to Elk M1 Monitoring
Added 2010-01-07
by ceaves
Provides access to the Elk M1 monitoring console via the HomeSeer interface. Download link towards end of page.

Katana: Portable Multi-Boot Security Suite
Added 2009-11-25
by .ronin
Katana v1 (Kyuzo) has just been released from www.hackfromacave.com . The Katana: Portable Multi-Boot Security Suite is designed to fulfill many of your computer security needs. The idea behind this tool is to bring together many of the best security distributions and applications to run from one USB Flash Drive. Instead of keeping track of dozens of CDs and DVDs loaded with your favorite security tools, you can keep them all conveniently in your pocket. Katana includes distributions which focus on Penetration Testing, Auditing, Password Cracking, Forensics and Honey Pots. Katana comes with over 100 portable Windows applications, such as Wireshark, HiJackThis, Unstoppable Copier, Firefox, and OllyDBG. It also includes the following distributions: - Backtrack 4 pre - the Ultimate Boot CD - Ophcrack Live - Damn Small Linux - the Ultimate Boot CD for Windows - Got Root? Slax - Organizational Systems Wireless Auditor (OSWA) Assistant - Damn Vulnerable Linux Katana is also highly customizable. You can modify Katana by adding or removing distributions and portable apps with ease. You can add functionality to distributions like the Ultimate Boot CD, Got Root? Slax and UBCD4Win. You can also load your personal scripts and documents to keep them conveniently with you on your flash drive to use in concert with the provided tools. More informations on this can be found at forum.hackfromacave.com

ASDIC
Added 2009-06-07
by Mikael Kuisma
ASDIC is a system for advanced traffic analysis. It helps you to investigate the traffic in your network by parsing firewalls logs and/or sniffing the network. Detects anomalies, identifies patterns and presents graphical reports.

NetworkMiner
Added 2009-05-21
by
NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows that can detect the OS, hostname and open ports of network hosts through packet sniffing or by parsing a PCAP file. NetworkMiner can also extract transmitted files from network traffic.

WPSpy
Added 2009-05-14
by
WPSpy is a tool to simply monitor and report changes in the WiFi Protected Setup status of and access point. This is particularly useful if you are running attacks against WPS.

WiFinger
Added 2009-05-14
by SourceSec Security Research
WiFinger passively identifies wireless access points based on matching the Information Elements in their beacon packets against a fingerprint database. It is written in Python and uses Scapy, and has been tested in Linux.

netifera
Added 2009-02-21
by netifera
modular open source platform for network security tools. Multi-platform GUI. Tools included: TCP/UDP network information gathering, fingerprinting, service detection, DNS tools, zone transfer, passive information gathering, modular sniffing engine, credential sniffing, geographical information,web crawler.

WinFail2Ban
Added 2009-01-11
by Vittorio Pavesi
Scans log files like FTP Logs or Event Viewer and bans IP that makes too many password failures. Basic idea is porting the features of Fail2Ban (http://www.fail2ban.org/) from Linux to Windows.

XArp
Added 2009-01-10
by Christoph P. Mayer
XArp provides advanced and highly customizable ARP spoofing detection. Active and passive mechanisms are available that can be configured per network interface using a GUI for normal users and a GUI for advanced users. XArp gives a complete view of all your network devices and the current state in ARP attacks.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus