(Page 4 of 23)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >

Category: Network Utilities » Miscellaneous

Added 2004-06-16
by Steve Lord
Athena is a search engine query tool designed to help find information leakage vulnerabilties using 'googledork' strings. Athena uses an extensible configuration format that supports multiple search engines (Yahoo and Google included). Athena is designed with ease of use in mind and a full illustrated manual is included featuring a full walkthrough.

Added 2004-06-02
by Simon Josefsson
DNSSEC Walker is a tool to recover DNS zonefiles using the DNS protocol. The server does not have to support zonetransfer, but the zone must contain DNSSEC "NXT" records.

Added 2004-04-13
by Frank da Cruz
C-Kermit is a combined serial and network communication software package offering a consistent, medium-independent, cross-platform approach to connection establishment, terminal sessions, file transfer, character-set translation, numeric and alphanumeric paging, and automation of communication tasks. Recent versions include FTP and HTTP clients as well as an SSH interface, all of which can be scripted and aware of character-sets. It supports built-in security methods, including Kerberos IV, Kerberos V, SSL/TLS, and SRP, FTP protocol features such as MLSD, and source-code parity with Kermit 95 2.1 for Windows and OS/2.

Added 2004-03-23
by Wes Hardaker
The NET-SNMP (formerly UCD-SNMP) package contains various tools relating to the Simple Network Management Protocol including an extensible agent, an SNMP library, tools to request or set information from SNMP agents, tools to generate and handle SNMP traps, a version of the unix 'netstat' command using SNMP and a Tk/perl mib browser. It was originally based on the Carnegie Mellon University SNMP implementation (version, but has been greatly enhanced, ported and fixed and barely resembles the original package anymore.

Qingy Is Not Getty
Added 2004-03-19
by Noberasco
qingy is a replacement for getty. It uses DirectFB to provide a fast, nice GUI without the overhead of the X Windows System. It allows the user to log in and start the session of his choice (text console, GNOME, KDE, wmaker, etc.).

MasarLabs NoArp
Added 2004-03-04
by Masar
MasarLabs NoArp is a Linux kernel module that filters and drops unwanted ARP requests. It is useful when you need to add an alias to the loopback interface to use a load balancer.

Added 2004-03-01
by Michael Schlenstedt
Onlinecalc summarizes your online time, transfer volume, and number of connections made to your ISP. It allows you to print out statistics concerning different date and time ranges. A CGI version of onlinecalc is also available.

Added 2004-03-01
by jeremy chartier
Snortalog (formerly known as Snort-ng) is a powerful Perl script that summarizes Snort logs, making it easy to view any network attacks detected by Snort. It can generate charts in HTML. It works with all versions of Snort, and can analyze logs in two formats: syslog alerts and text alerts. It does not include a database for maximum performance.

Added 2004-02-13
by rainer
Beltane is a Web-based central management console for the samhain file integrity system. If samhain is used in a client/server setup, beltane enables the administrator to browse client reports, acknowledge them, and update file signature databases stored centrally on the log server.

Added 2004-02-11
by Mario Bucsics
monagent is a collection of tools which allows you to monitor anything by writing scripts in any language you prefer. As long as you supply the correct output format, the data will be monitored, and you will get an email or SMS message when a certain threshold exceeds the limits that you have defined. It consists of a Unix daemon, a monitoring viewer, and an admin tool for setting thresholds. The viewer and admintool are written in VB6. An Oracle Database is used for the monitoring schema, and an Oracle Client installation is needed on every host you want to monitor.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus