< Prev 6 7 8 9 10 11 12 13 14 15 16 Next >
IIP (Invisible IRC Project)
Invisible Irc Project's IIP software is the first secure and anonymous Instant Messenging system utilizing the IRC protocol. This is a 3-tier crypto-network design that protects the users and servers from each other, and is compatible with all IRC clients seemlessly. Utilizing Diffie-Hellman Key Exchange Protocol, and 128 bit Blowfish session encryption, this is the tool for secure, private, communication between users.
libdnet provides a simplified, portable interface to several low-level networking routines, including network address manipulation, kernel arp(4) cache and route(4) table lookup and manipulation, network firewalling, network interface lookup and manipulation, and raw IP packet and Ethernet frame transmission.
Stegdetect is an automated tool for detecting steganographic content in images. It is capable of detecting several different steganographic methods to embed hidden information in JPEG images. Currently, the detectable schemes are jsteg, jphide, and outguess 01.3b.
Arpwatch is a tool that monitors ethernet activity and keeps a database of ethernet/ip address pairings. It also reports certain changes via email. Arpwatch uses libpcap, a system-independent interface for user-level packet capture. Before building tcpdump, you must first retrieve and build libpcap, also from LBL, in: ftp://ftp.ee.lbl.gov/libpcap-*.tar.Z.
fsh uses lsh or ssh to establish a secure tunnel to the remote system. This takes as long as a normal connection establishment, but once the tunnel is established, fsh can reuse it to start new sessions on the remote system almost instantaneously. You get the security of ssh and the speed of rsh.
The modular syslog allows for an easy implementation of input and output modules. The modules that mantain compatibility with its precursor are included in the standard distribution along with four modules: om_peo (an implementation of PEO-1 and L-PEO, two algorithmic protocols for integrity checking), om_mysql and om_pgsql (modules that sends output to a mysql and postgresql database, respectively) and om_regex (a module that allows output redirection using regular expressions).
Audit is a client/server system that allows remote system logs auditing and centralizing. It supports standard and modular syslog output formats (non-standard logs can be easily supported due to its modular design). The server (auditd) runs on audited machines and the client (audit) runs on the auditors workstations. Multiple auditors are supported and managed by one or more 'chief' auditors. Auditors can be configured in a way that each of them can examine specific sets of logs.
Multi threaded cgi scanner. It has rulesets and more than 2500 cgi script checks.
Shadow is a public domain software system currently in use protecting more than 14,000 hosts in the military and in commercial organizations. Developed by the Naval Surface Warfare Center, Dahlgern Division, it is a filter-based tool that separates the sensor from the analysis station in order to keep attackers in the dark about what is being filtered. Built on tcpdump and other public domain tools, and with hardware requirements under $10K, it provides a low-cost approach to adanced intrusion detection.
X is a logic developed from the various Active Operating System Fingerprinting methods discovered during the "ICMP Usage In Scanning" research project. Xprobe is a tool automating the X logic.
Browse by category