(Page 1 of 50)   1 2 3 4 5 6 7 8 9 10 11  Next >

Platform: Solaris

moth
Added 2009-06-08
by Bonsai - Information Security
Moth is a VMware image with a set of vulnerable Web Applications and scripts, that you may use for: 1. Testing Web Application Security Scanners 2. Testing Static Code Analysis tools (SCA) 3. Giving an introductory course to Web Application Security

OSSEC HIDS
Added 2009-02-27
by Third Brigade
OSSEC is an Open Source Host-based Intrusion Detection System. It performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.

D.O.P.E
Added 2008-12-26
by Mr.Mojo
Dis.Org Penetration Extension for Firefox (D.O.P.E) A User agent Switcher for firefox that supports the following: Search engine Impersonating Operating Systems Impersonation Browser Impersonation Cellular Phones and Mobile Devices Impersonation Game Consoles Impersonation http://www.lostlight.net/tools/blog.html

OSSEC HIDS
Added 2008-11-18
by Third Brigade
OSSEC is an Open Source Host-based Intrusion Detection System. It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, real-time alerting and active response. It runs on most operating systems, including Linux, OpenBSD, FreeBSD, MacOS, Solaris and Windows.

w3af
Added 2008-11-03
by Andres Riancho
w3af is a Web Application Attack and Audit Framework. The project goal is to create a framework to find and exploit web application vulnerabilities that is easy to use and extend.

GreenSQL
Added 2008-10-23
by Yuli Stremovsky
GreenSQL is an Open Source database firewall used to protect databases from SQL injection attacks. GreenSQL works as a proxy for SQL commands and has built in support for MySQL. The logic is based on evaluation of SQL commands using a risk scoring matrix as well as blocking known db administrative commands (DROP, CREATE, etc). GreenSQL is distributed under the GPL license.

Splunk Log Management | IT Search
Added 2008-10-16
by Splunk, Inc
Splunk is a FREE software program that indexes and makes searchable data from any app, server or network device in real time including logs, config files, messages, alerts, scripts and metrics.

PandoraFMS
Added 2008-09-23
by Sancho Lerena
Pandora FMS is monitoring software. It can detect a network interface down, a defacement in your website, a memory leak in one of your server application, or the movement of any value of the NASDAQ new technology market. Pandora FMS can send SMS messages when your systems fails... or when Google's value drop below US$ 500. Pandora FMS can monitor Windows remotely (through WMI), any device via TCP and/or ICMP checks, and any SNMP device through polling and trap reception. Also allows to reuse user-defined "plugins" that make remote checks, like execute remote commands, connecting devices by telnet to gather data, etc. Pandora FMS can perform periodical network reconnissances to discover new hosts and devices on the network and can create a visual network map, with its network topology and OS type. Pandora FMS also has an WYSIWYG AJAX Visual Console editor for interactive map creation; It has also advanced features like data replication across multiple Pandora FMS setups, pattern-anomaly detection, a prediction engine, a event notificacion manager and a correlation alert system. Besides agentless monitoring it has software agents that can be installed in most OS on the market, these agents can be remotely configured from the Console, and are able to process logs from Windows and Unix systems. Reporting features include user defined reports: SLA checks, real time graphs, and much more possibilities thanks to its SQL automanaged backend. Link & Other data:

OSSEC HIDS
Added 2008-08-29
by Third Brigade
OSSEC is an Open Source Host-based Intrusion Detection System. It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, real-time alerting and active response. It runs on most operating systems, including Linux, OpenBSD, FreeBSD, MacOS, Solaris and Windows.

dotDefender
Added 2008-08-05
by Applicure Technologies
dotDefender provides plug-and-play protection against SQL Injection, Cross-site scripting, Path Traversal, and many other application attacks. Web server security is achieved by rapid deployment of dotDefender™ as a software plug-in. Residing on the web server, dotDefender can be installed and implemented in minutes without influence on traffic or network architecture. The dotDefender™ website protector comes with a predefined set of internet security rules for out of the box best practices website protection. Automatic live update ensures website security that is ready to counter the latest malicious attacks.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus