(Page 13 of 47)   < Prev  8 9 10 11 12 13 14 15 16 17 18  Next >

Platform: Windows XP

DarkSpy Anti-Rootkit
Added 2006-06-06
by CardMagic & wowocock
DarkSpy(Freeware) Anti-Rookit is a powerful tool for rootkit detection. DarkSpy is a multiway-based detection tool . It internally combines many effective detection techniques, including DarkSpy's own handlers and also methods used by other famous tools. DarkSpy 1.0.5 new features: Enhanced Process/Driver Module detection. Fixed some problems working with other security software(Karspersky...etc). Enhanced process force terminate functionality. Start to support multi-cpu and hyperthread. Registry functionality added. Help document added. Use it at your own risk.

cenfw
Added 2006-06-02
by Peter Robinson
The Centron IPTables Firewall Gui is an object oriented, database driven, windows interface to linux IPtables firewall rules. Now with Snat, Dnat and Masq Functionality. Many other bug fixes. Fixed root passwd issue

Password Policy Enforcer
Added 2006-05-30
by ANIXIS
Password Policy Enforcer allows you to create and enforce up to 256 different password policies in a Windows domain. Policies are easily configured, and can be assigned to specific users, groups, and organizational units. An optional client component helps users to choose a suitable password, and reduces password related helpdesk calls. PPE is the only commercially available password filter specified in the "DISA Field Security Operations - Windows 2003/XP/2000 Addendum V5R1 [UNCLASSIFIED]" PPE can also integrate with ANIXIS Password Reset, a self-service password management system that allows users to securely reset their own passwords.

ServerMask
Added 2006-05-26
by Joe Lima
ANY INFORMATION A HACKER CAN OBTAIN ABOUT YOUR SYSTEM IS TOO MUCH INFORMATION. Broadcasting your Web server's identity via HTTP header data makes it easy for potential intruders to complete their first hacking task: identifying your OS and Web server. Hacker pre-attack reconnaissance accounts for 40% of all Internet attack traffic, so make sure that your Windows Web server isn’t giving away unnecessary clues about its identity. SERVERMASK SOFTWARE FROM PORT80 SOFTWARE MODIFIES YOUR WEB SERVER’S "FINGERPRINT" by removing unnecessary HTTP response data, modifying cookie values, and obscuring other response information, thus masking the identity of your server. Advanced options include custom header creation, Apache emulation, response randomization, a Remove Any Header feature, cookie masking, and one-click WebDav disabling. PART OF A TOTAL SECURITY STRATEGY FOR WINDOWS-BASED WEB SERVERS, ServerMask software provides camouflage to augment the armor provided by firewalls and intrusion detection systems (IDS). Not only does successful obfuscation discourage attacks in the first place by making your Windows server less conspicuous, but it also makes hackers more likely to trigger IDS through misguided exploits. ServerMask is already used by thousands of customers, including financial institutions, governments, and corporations concerned with security best practices, and has been hailed as "clearly the best solution yet produced for managing the IIS Server banner." INSTALLED IN MINUTES AS A SUPER-FAST AND STABLE ISAPI FILTER, ServerMask is fully compatible with IIS 4, 5, and 6, IIS Lockdown, URLScan, FrontPage, Outlook Web Access, and major scripting platforms like ASP, ASP.NET, ColdFusion, PHP, and Perl. ServerMask is available for a free, fully functional 30-day trial and includes free technical support. FOR COMPLETE OS/SERVER ANNONYMIZATION AT THE TCP/IP LEVEL AND INTRUSION PREVENTION, CHECK OUT PORT80’s SERVERMASK IP APPLIANCES: www.servermask.com/appliances

Aeer Ports Statistics Viewer (Open Source)
Added 2006-05-25
by Nima Bagheri
Aeer Ports Statistics Viewer “Aeer” is name of a Tree in Persian Country ( Egypt ) Introduction =========== Ports statistics is utility that shows protocol statistics and current TCP/IP - UDP/IP network connections. This tool shows all open ports found on the current machine. Each open port represents a service/application; if one of these services can be 'exploited', the hacker could gain access to that machine. Therefore, it's important to close any port that is not needed. Ports statistics shows these properties fields including: Pid (Global process identifier that you can use to identify a process. The value is valid from the time a process is created until it is terminated. ) Port Number (Local port number connections.) Port Type (TCP/UDP) Processes (Contains Processes Names.) Host Address (Host IP Address.) Remote Port (Remote port number.) Status Port Processes File (Show Path to the executable file of the process. Example: C:\WINDOWS\EXPLORER.EXE. ) File Length (This is the length of Processes file names. This method Block the windows file spoofing (WFS) trick. For more see http://www.rootkit.com/newsread_print.php?newsid=486.) Processes Start Time (obtains timing information about a specified process.) Processes Running Level (Returns the user name and the domain name under the owner of this process.) SID (Returns the security identifier descriptor for this process.) Processes Command Line (Command line used to start a specific process, if applicable. This property is new for Windows XP. For example if attacker exactable telnet process like this: Telnet 127.0.0.1 12345.) Aeer’s Download Link: https://www.rootkit.com/vault/neocrackr/Aeer.rar E-mail: Thecrackers_group <>at<> yahoo <>dot<> ca THE CRACKERS GROUP INC 2006 (C) , Nima Bagheri

phpShield PHP Encoder
Added 2006-05-22
by phpShield.com
phpSHIELD protects your PHP Source Code with a powerful, easy to use encoder, which creates a native bytecode version of the script and then encrypts it.

Sourceguardian PHP Encoder
Added 2006-05-22
by Sourceguardian.com
SourceGuardian is the only serious choice for protecting and encrypting your PHP source code assets. With flexibility that other products only dream of - Professional developers everywhere are using SourceGuardian products to distribute their scripts safely.

Tiger Envelopes
Added 2006-05-21
by Tiger Privacy
Tiger Envelopes lets you read and write mail without worrying about who's snooping on you. Ordinary email is like sending all your messages on postcards. Anyone who's nosy can read it. What we need is something as easy as envelopes, but for email. That's what Tiger Envelopes is. You don't need to change your mail client. There are no extra steps. Tiger even puts your message in the envelope for you. One click to install on Windows, Mac, and Linux. Automatically configures Outlook, Outlook Express, Mac Mail and KMail for you. It's free and open source, of course.

JAAScois Anti-WebInjection
Added 2006-05-20
by http://www.jaascois.com
JAAScois Anti-WebInjection will scan all website for analysis any Injection exploits - SQL Injection Exploits - Remote File Inclusion Exploits - Cross-Site Scripting - XSS Exploits - Error Pages 404 , 500 etc ... - Password & Upload Pages By JAAScois (C) 2006

SwitchSniffer
Added 2006-05-20
by Gordon Ahn
>>> Overview SwitchSniffer is a program that can scan your switched LAN for up hosts and can reroute and collect all packets without the target users' recognition. It can also detect the ‘arpspoofer’ program running on the network and block user definable sessions like firewall. If you use this program in tandem with any sniffer program, you can capture and see the users’ IDs and passwords on a switched network. That is, SwitchSniffer enables you to monitor all the packets and all the hosts on a switch network. >>> SwitchSniffer has the following features: SwitchSniffer can poll and collect all the packets on the switched LAN. SwitchSniffer can scan and display the active hosts on the LAN quickly, and automatically. While spoofing ARP tables, SwitchSniffer can act as another gateway (or ip-forwarder) without other users' recognition on the LAN.' It can collect and forward packets by selecting inbound, outbound, and both to be sent to the Internet. An ARP table is recovered automatically in about 30 seconds. But, SwitchSniffer can keep spoofing continuously by updating the target computer’s ARP table more frequently. If one or more network interface cards are installed on a computer, you can choose which NIC you would like SwitchSniffer to scan and spoof through. SwitchSniffer can display information about the amount of data transferred to and from the internet. SwitchSniffer can detect if any computer on the LAN is running an ‘arpspoofer’ program. SwitchSniffer can filter: sessions, local hosts, and remote hosts. The installation of the ‘winpcap’ driver is not necessary for SwitchSniffer. SwitchSniffer can manage the local hosts based on MAC Address. SwitchSniffer can act as a plug-and-played router. SwitchSniffer can export the data of view into an excel file. >>> SwitchSniffer has the following benefits: SwitchSniffer can find the hidden hosts on the LAN, which is not found by IP-Scanners. SwitchSniffer can find if abnormal hosts are connected to your wireless network. SwitchSniffer protects your network from abnormal users. SwitchSniffer can check if there are abnormal packets on the LAN. SwitchSniffer allows you to capture user IDs, passwords, chat sessions and web sessions etc., on the switched network through the use of a sniffer application. SwitchSniffer can block the local hosts based on MAC Address. SwitchSniffer can resolve the problem of IP Collision. SwitchSniffer can find out the country name by ip address on remote. SwitchSniffer enables you to monitor all the packets on a switch network.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus