(Page 11 of 22)   < Prev  6 7 8 9 10 11 12 13 14 15 16  Next >

Platform: NetBSD

IIP (Invisible IRC Project)
Added 2002-02-05
by IIP Team
Invisible Irc Project's IIP software is the first secure and anonymous Instant Messenging system utilizing the IRC protocol. This is a 3-tier crypto-network design that protects the users and servers from each other, and is compatible with all IRC clients seemlessly. Utilizing Diffie-Hellman Key Exchange Protocol, and 128 bit Blowfish session encryption, this is the tool for secure, private, communication between users.

Added 2002-01-28
by dugsong
libdnet provides a simplified, portable interface to several low-level networking routines, including network address manipulation, kernel arp(4) cache and route(4) table lookup and manipulation, network firewalling, network interface lookup and manipulation, and raw IP packet and Ethernet frame transmission.

Added 2002-01-28
by Niels Provos
Stegdetect is an automated tool for detecting steganographic content in images. It is capable of detecting several different steganographic methods to embed hidden information in JPEG images. Currently, the detectable schemes are jsteg, jphide, and outguess 01.3b.

Added 2002-01-25
by LBL Network Research Group
Arpwatch is a tool that monitors ethernet activity and keeps a database of ethernet/ip address pairings. It also reports certain changes via email. Arpwatch uses libpcap, a system-independent interface for user-level packet capture. Before building tcpdump, you must first retrieve and build libpcap, also from LBL, in: ftp://ftp.ee.lbl.gov/libpcap-*.tar.Z.

Added 2001-12-27
by Per Cederqvist
fsh uses lsh or ssh to establish a secure tunnel to the remote system. This takes as long as a normal connection establishment, but once the tunnel is established, fsh can reuse it to start new sessions on the remote system almost instantaneously. You get the security of ssh and the speed of rsh.

Modular Syslog
Added 2001-12-05
by Alejo
The modular syslog allows for an easy implementation of input and output modules. The modules that mantain compatibility with its precursor are included in the standard distribution along with four modules: om_peo (an implementation of PEO-1 and L-PEO, two algorithmic protocols for integrity checking), om_mysql and om_pgsql (modules that sends output to a mysql and postgresql database, respectively) and om_regex (a module that allows output redirection using regular expressions).

Added 2001-11-29
by Core Security Technologies
Audit is a client/server system that allows remote system logs auditing and centralizing. It supports standard and modular syslog output formats (non-standard logs can be easily supported due to its modular design). The server (auditd) runs on audited machines and the client (audit) runs on the auditors workstations. Multiple auditors are supported and managed by one or more 'chief' auditors. Auditors can be configured in a way that each of them can examine specific sets of logs.

Cgi Scanner
Added 2001-11-05
by m3hm3t
Multi threaded cgi scanner. It has rulesets and more than 2500 cgi script checks.

Added 2001-10-31
by Naval Surface Warfare Center, Dahlgren Division
Shadow is a public domain software system currently in use protecting more than 14,000 hosts in the military and in commercial organizations. Developed by the Naval Surface Warfare Center, Dahlgern Division, it is a filter-based tool that separates the sensor from the analysis station in order to keep attackers in the dark about what is being filtered. Built on tcpdump and other public domain tools, and with hardware requirements under $10K, it provides a low-cost approach to adanced intrusion detection.

Added 2001-10-31
by Fyodor Yarochkin , Ofir Arkin
X is a logic developed from the various Active Operating System Fingerprinting methods discovered during the "ICMP Usage In Scanning" research project. Xprobe is a tool automating the X logic.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus