< Prev 1 2 3 4 5 6 7 8 9 10 11 Next >
Category: Intrusion Detection
ASDIC is a system for advanced traffic and log analysis. It helps you to determine what traffic there is in your network. You can look at ASDIC as a reverse firewall. Input unstructured traffic information and output a rule set. ASDIC can analyze logs from any firewall or router, or sniff the network by itself.
UserLock secures access to Windows networks by controlling the amount of simultaneous sessions and by limiting network access per user or group. With UserLock, a network administrator can implement and enforce efficient restriction and access policies for Windows NT/2000/XP/2003 networks (LAN and WAN), and monitor and manage all sessions in real time: receive alerts, remotely disconnect or lock a user session and automatically log activity and generate precise session reports and statistics.
SpoofMAC is a powerful, easy to use and intuitive MAC Address Changing (Spoofing) Tool for Windows systems. Includes Command-line Scripting, IPConfig and automatic spoofing tools. SpoofMAC allows users to change the MAC Address of Network Adapters on Windows 2000, XP and 2003 Server systems. SpoofMAC helps people protect their privacy by hiding their MAC Address and helps IT Professionals test network security and recover MAC Address based software licenses. SpoofMAC was developed by certified IT Security and Software Development professionals.
LINReS is a Live Response script designed to run on suspect/compromised Linux systems system with a minimal impact on the system to satisfy various forensic standards requirements. This script has been tested successfully on RedHat Enterprise Linux systems. LINReS consists of mostly statically compiled binaries and includes the various shared libraries that may be required to run the binaries (which are not statically compiled). All in all, no binary from the compromised system is used by this tool which mitigates the risk of collecting information on a trojaned system.
Helios is an advanced malware detection system. It has been designed to detect, remove and inoculate against modern Windows rootkits. It performs behavioral analysis as opposed to signature based analysis and is one of the only tools that is able to detect rootkits in real-time, unhide hidden processes, restore hijacked system functions and inoculate the system against rootkit installation.
Open Leak Prevention Test Tool
The Open Leak Prevention Test Tool is an open source, freely distributed tool and methodology that were developed and maintained by PortAuthority Technologies Inc in order to measure the accuracy, effectiveness and detection capabilities of content filtering technologies used by Information Leak Prevention and Content Monitoring and Filtering products to prevent information leaks and ensure corporate and regulatory compliance.
A web services (currently SOAP) pen testing fuzzer. It works off a combination of static attack data as well as dynamic intelligently generated attack vectors. Some of its features are IDS Evasion and some automated WSDL discovery.
OSSEC HIDS is an Open Source Host-based Intrusion Detection System. It performs log analysis and correlation, integrity checking, rootkit detection, time-based alerting and active response. It runs on most operating systems, including Linux, OpenBSD, FreeBSD, Solaris and Windows.
Windows File Monitor Service : created, changed, deleted, renamed and created-auto-removed on DotNet(.NET)
WSTOOL(Web vulnerable scan tool)
Web vulnerable scanner (For ASP + SQLSERVER) - SQL injection - XSS Cross Site Scripting - 404/500 server error - Admin/Manage folder search - web-base or command-line scanner by PHP - Check up collate with HTML FORM and LINK
Browse by category