(Page 1 of 5)   1 2 3 4 5  Next >

Category: Hardening

Harden SSL/TLS
Added 2010-02-22
by Thierry Zoller
Harden SSL/TLS” allows hardening SSL/TLS Schannel settings of Windows 2000,2003,2008,2008R2, XP,Vista,7. It allows to locally and remotely set SSL policies allowing or denying certain ciphers/hashes or complete ciphersuites. This tool specific allows setting policies with regards to what ciphers and protocols are available to applications that use SCHANNEL crypto interface. A lot of windows applications do use this interface, for instance Google Chrome as well as Apple Safari are a few of these. By changing the settings you can indirectly control what ciphers these applications are allowed to use.

OSSEC HIDS
Added 2009-02-27
by Third Brigade
OSSEC is an Open Source Host-based Intrusion Detection System. It performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.

w3af
Added 2008-11-03
by Andres Riancho
w3af is a Web Application Attack and Audit Framework. The project goal is to create a framework to find and exploit web application vulnerabilities that is easy to use and extend.

OSSEC HIDS
Added 2008-08-29
by Third Brigade
OSSEC is an Open Source Host-based Intrusion Detection System. It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, real-time alerting and active response. It runs on most operating systems, including Linux, OpenBSD, FreeBSD, MacOS, Solaris and Windows.

IIS Secure Parameter Filter (SPF)
Added 2008-08-22
by Brian Holyfield / Gotham Digital Science
SPF is an application security module designed for Microsoft IIS web servers. SPF uses cryptography to dynamically secure embedded application parameters at runtime (Query String Values, Form Inputs & Cookies). SPF does not require any changes to the underlying application code and provides instant protection against parameter tampering, URL manipulation and replay attacks. SPF also includes the capability to define forbidden input patterns (Black-Lists) using regular expressions to block known attack signatures.

Specops Password Policy
Added 2006-11-16
by Special Operations Software
Specops Password Policy is an advanced password filter that gives you more than one password policy per domain in Windows. Something that Microsoft left out from Windows 2000 and Vista. With Specops Password Policy you can have an unlimited number of password policies per Active Directory domain. Specops Password Policy also increases your password granularity options a lot compared to the built-in password policy settings in Windows.

ServerAngel
Added 2006-10-12
by
A port and vulnerability scanner. Audit what the internet can actually see running on your server. Use your report to harden your services against attack.

Jailkit
Added 2006-09-07
by Olivier Sessink
Jailkit is a suite to create and deploy chroot jails for user accounts and for daemons. It has several utilities to facilitate the setup of chroot jails and utilities to use and check existing jails.

LINReS
Added 2006-08-07
by Kush Wadhwa, Chetan Gupta
LINReS is a Live Response script designed to run on suspect/compromised Linux systems system with a minimal impact on the system to satisfy various forensic standards requirements. This script has been tested successfully on RedHat Enterprise Linux systems. LINReS consists of mostly statically compiled binaries and includes the various shared libraries that may be required to run the binaries (which are not statically compiled). All in all, no binary from the compromised system is used by this tool which mitigates the risk of collecting information on a trojaned system.

Helios
Added 2006-07-14
by MIEL e-Security Pvt. Ltd.
Helios is an advanced malware detection system. It has been designed to detect, remove and inoculate against modern Windows rootkits. It performs behavioral analysis as opposed to signature based analysis and is one of the only tools that is able to detect rootkits in real-time, unhide hidden processes, restore hijacked system functions and inoculate the system against rootkit installation.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus