(Page 9 of 23)   < Prev  4 5 6 7 8 9 10 11 12 13 14  Next >

Category: Network Utilities » Miscellaneous

Apache Chunked Scanner
Added 2002-06-21
by eEye Digital Security
The Retina Apache Chunked Scanner is a tool created by eEye that is able to scan up to 254 IP addresses at once and determine if any are vulnerable to the recent Apache Chunked Encoding overflow. If an IP address is found to be vulnerable to the Apache Chunked Encoding attack, then the Retina Apache Chunked Scanner will flag the IP address. Administrators can then double-click on the IP address to be taken to a website with information on how to fix the vulnerability.

Web shell
Added 2002-06-12
by Alex Dyatlov
Webshell is a remote UNIX shell that works via HTTP. The client script provides a shell-like prompt, encapsulating user commands into HTTP POST requests and sending them to the server script. The server script extracts and executes commands and returns STDOUT and STDERR output. Features include command line history support, file upload/download, and it can work through an HTTP proxy server.

InitScripts VPN Extensions
Added 2002-06-10
by MSG
InitScripts VPN Extensions consists of two packages that will allow you to easily implement VPNs using PPP over SSH or PPTP. They are both integrated into the initscripts style of interface control, so a simple 'ifup vpn0' will bring up a VPN connection, and no additional SUID root applications are required. The SSH package implements both client and server functions. The PPTP package provides only the client functions.

Added 2002-06-06
by daten
xNBTScan is a GTK 2 interface to the NBTscan program, useful for locating netbios services on a network. It supports all options available in NBTscan 1.0.3.

Added 2002-06-04
by Active@ Data Recovery Software
Active@ UNERASER is a compact and powerful undelete utility that can recover deleted files and folders on FAT12, FAT16, FAT32 and NTFS systems. It can even restore files from deleted and re-formatted partitions. With this data recovery software NTFS drives can be recognized and deleted items can be recovered from Microsoft DOS. It is not necessary to install the utility on your system's hard drive, as it fits on a boot floppy disk, removing the possibility of overwriting data which you want to recover.

Added 2002-05-30
by William W. Ferrell
LCDproc is a utility to drive one or more LCD (and LCD-like) devices attached to a host. It is comprised of a server, which uses a modular device driver system to control attached displays, and one or more clients to gather data as appropriate and send screen data to the server. The included client displays a multitude of system statistics (CPU/memory/disk usage, uptime, date and time, temperature, etc.). Multiple clients can connect to the server simultaneously, and clients can set priorities on the screens they provide to influence in what order items are displayed. This facility can also be used to "pop" critical screens (such as an entry from syslog from a log-watching client). All functionality is implemented in userland. Support for many display devices and several platforms (Linux, *BSD, and Solaris at least) is included.

The Logging Project
Added 2002-05-30
by Jason Royes
The Logging Project (formerly salt) is a suite of tools which provide centralized, secure, fault-tolerant logging. It is flexible, robust, and easy to integrate, making it an attractive alternative to replacing syslog.

UIF - Userfriendly Iptables Frontend
Added 2002-05-27
by Jörg Platte
The Userfriendly Iptables Frontend is used to generate optimized iptables packet filter rules, using a simple description file specified by the user. Generated rules are provided in iptables- save style. UIF can be used to read or write rulesets to or from LDAP servers in your network, which provides a global storing mechanism. Its aim is to be an easy to configure, human readable packet filter.

Added 2002-05-14
by Arne Vidstrom
GrabItAll performs traffic redirection by sending spoofed ARP replies. It can redirect traffic from one computer to the attackers computer, or redirect traffic between two other computers through the attackers computer. In the last case you need to enable IP Forwarding which can be done with GrabItAll too.

Added 2002-05-08
by Arne Vidstrom
EtherFlood floods a switched network with Ethernet frames with random hardware addresses. The effect on some switches is that they start sending all traffic out on all ports so you can sniff all traffic on the network.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus