< Prev 5 6 7 8 9 10 11 12 13 14 15 Next >
Category: Network Utilities » Miscellaneous
Quick and Dirty Packet Forwarder
QDPF was written to solve the problem of exposing internal services to the Internet. QDPF runs on machines which bridge two networks and forwards TCP/IP packets from one to the other. The main use of QDPF is to expose corporate or Intranet services to the Internet, by running it on an intervening machine. QDPF is a Java console application.
TLSWrap is a TLS/SSL FTP wrapper/proxy for UNIX and WIN32, allowing you to use your favourite FTP client with any TLS/SSL-enabled FTP server. Features include full encryption of both control and data connections.
Various tools relating to the Simple Network Management Protocol including: - An extensible agent - An SNMP library - tools to request or set information from SNMP agents - tools to generate and handle SNMP traps - a version of the unix 'netstat' command using SNMP - a Tk/perl mib browser This package was originally based on the Carnegie Mellon University SNMP implementation, but has been greatly enhanced, ported, fixed, made easier to use and barely resembles the original package anymore.
I.P. will assist Penetration Engineers with vital information about a client's network, while also assisting companies with information about their competitors. I.P. can also aid companies in finding out where on the Internet their systems have been as well as find out what their employees are talking about which may be proprietary company information.
PromiscDetect checks if your network adapter(s) is running in promiscuous mode, which may be a sign that you have a sniffer running on your computer.
fragroute intercepts, modifies, and rewrites egress traffic, implementing most of the attacks described in the Secure Networks "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection" paper. It features a simple ruleset language to delay, duplicate, drop, fragment, overlap, print, reorder, segment, source-route, or otherwise monkey with all outbound packets destined for a target host, with minimal support for randomized or probabilistic behaviour. This tool was written in good faith to aid in the testing of intrusion detection systems, firewalls, and basic TCP/IP stack behaviour.
cotty is a simple command-line tool to manage pseudo-terminals. It allows users to run processes communicating with each other through their tty as opposed to files, pipes, or sockets. Its main use is to build a VPN (virtual private network) or conversely pierce a firewall.
CHX-I Packet Filter
Designed to complement the CHX-I application firewall engine at the network level, the CHX-I Packet Filter can be used on Windows 2000/XP servers or workstations as a first level of defense. It's great graphic user interface and management flexibility allows for rapid filter creation and deployment.
OOPS Bug Tracking System
OOPS is a comprehensive bug tracking system. It allows developers to track their bugs in much the same way as Bugzilla, but without all the overhead of unnecessary features.
NetSPoc (Network Security Policy Compiler)
The Network Security Policy Compiler (NetSPoC) is a tool for security management of large computer networks with different security domains. It generates configuration files for packet filters controlling the borders of security domains. It provides its own language for describing security policy and the topology of a network. The security policy is a set of rules that state which packets are allowed to pass the network and which are not. NetSPoC is topology aware; a rule for traffic from A to B is automatically applied to all managed packet filters on the path from A to B.
Browse by category