(Page 14 of 84)   < Prev  9 10 11 12 13 14 15 16 17 18 19  Next >

Category: Utilities

Added 2005-11-28
by gh0sted
Ktracker is used to keep security auditors toolbox update. More than 90 security entries. Ktracker is using a Live Update feature to download latest database. More features in the next coming release 1.2.0 (Advanced info on tool, Mini Howto, new category (Licence)..)

Added 2005-11-23
by SurveilleTech, LLC.
e-Surveiller is a powerful user-activity monitoring, logging and real-time surveillance software package. With it, you can monitor the activities of several computer users on standalone computers, on a local area network and on remote computers across the Internet. You view the screens of monitored users on a LAN or across the Internet in real-time! and it empowers you to save screen snapshots at any time. It stealthily records all keystrokes, Web site visits, all AOL, AIM, ICQ, MSN and Yahoo chat conversations, all windows, applications, file changes etc. User-activity logs are periodically transferred, uploaded or emailed to you for analysis + more! Other features include password-protection, peer-to-peer network support, remote monitoring updates and a comprehensive user-activity log viewer.

Collapse Web Application Scanner
Added 2005-11-23
by Syhunt Security Team
Collapse, a free tool from Syhunt, allows web administrators to perform aggressive and comprehensive scans of an organization's web server to isolate vulnerabilities and identify security holes. The Collapse scanner requires basic inputs such as host names and port numbers to scan a complete web site and test all the web applications for security vulnerabilities. This new version includes several user-requested enhancements as well as some bugfixes.

Added 2005-11-08
by Gordon Ahn
1. Overview SwitchSniffer is a program that can scan computers alive and can pull, collect all packets and can route them without other users' recognition on the LAN. It can also detect arpspoofer program running on the network and block sessions like firewall. If you run this program and any sniffer program, you can even get and see all user ids/passwords on the switch network. 1.1 Features -. It can pull and collect all the packets on the LAN. -. It can scan and show the active hosts on the LAN within a very short time. -. While spoofing ARP tables, it can act as another gateway (or ip-forwarder) without other users' recognition on the LAN. -. It can collect and forward packets by selecting inbound, outbound, and both to be sent to the Internet. -. An ARP table is recovered automatically in a little time (about 30 seconds). But, this program can keep spoofing continuously with a periodic time. -. Although one or more network interface cards are installed on a computer, this program can scan and spoof by selecting one of NICs. -. It can get traffic information about the amount of data transferred to and from the internet including I session information. -. It can detect which computer is running an arpspoofer program on the local network. -. It can scan all hosts automatically on the network. -. It has a feature which filters or blocks sessions, local hosts and remote hosts. -. No more installation of winpcap driver. 1.2 Benefits: -. It can find out the hidden hosts on local area network. -. It can check out if abnormal hosts are connected on the wireless network. -. It protect your network from abnormal users. -. It can check out if there are abnormal packets on the local network. -. It can view users/passwords, chat sessions and web sessions etc., on the switch network by other application. 2. System Requirement Local : Windows nt4/2000/xp/2003, 25MB free main memory, Standard network adapter, LAN Connection (adapters supporting promiscuous mode) Remote : All computers including network devices

Coarse PortKnocking
Added 2005-11-03
by Andre Luiz Rodrigues Ferreira
This is a simple implementation of Port Knocking techniques. This sniffs network packets with determined keys and executes commands like firewall to open and close ports. In the client mode injects packets with key to server.

Added 2005-11-03
by Michael Hendrickx, CISSP
LiLith is a tool written in Perl to audit web applications. This tool analyses webpages and looks for html <form> tags , which often refer to dynamic pages that might be subject to sql injection or other flaws.

Added 2005-10-20
by Alfredo Andres and David Barroso
Yersinia is a network tool designed to take advantage of some weakeness in different layer 2 protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. Currently, the following network protocols are implemented: Spanning Tree Protocol (STP), Cisco Discovery Protocol (CDP), Dynamic Trunking Protocol (DTP), Dynamic Host Configuration Protocol (DHCP), Hot Standby Router Protocol (HSRP), IEEE 802.1q, Inter-Switch Link Protocol (ISL), VLAN Trunking Protocol (VTP).

Added 2005-10-16
by SurveilleTech, LLC.
e-Surveiller is a powerful user-activity monitoring, logging and surveillance suite. With it, you can record all keystrokes, Web site visits, windows, AOL, AIM, ICQ, MSN and Yahoo chats, etc. of computer users on standalone computers, on a local area network and on remote computers across the Internet. You view the screens of monitored users on a LAN or across the Internet in real-time! User-activity logs are also periodically uploaded or emailed to you for analysis + MORE!

Free Random Password Generator
Added 2005-10-14
by The Bitmill Inc.
Create and customize random passwords with this online tool.

Added 2005-10-13
by Opencomputing Technologies Pvt Ltd.
Opencomputing's OpenProtect is an integrated server side email filtering solution offering antivirus, antispam and content filtering abilities at the MTA (postfix, sendmail, qmail, exim) level. With OpenProtect, you can protect your organisation from all email threats (virus, spam, phishing) and control content (want to filter password protected zip files? Allow only encrypted emails? disarm HTML emails and a myraid of other options) at the server level. Available as GPL/Free software with Commercial support and antivirus plugin.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus