(Page 10 of 23)   < Prev  5 6 7 8 9 10 11 12 13 14 15  Next >

Category: Network Utilities » Miscellaneous

Quick and Dirty Packet Forwarder
Added 2002-05-06
by John Hawksley
QDPF was written to solve the problem of exposing internal services to the Internet. QDPF runs on machines which bridge two networks and forwards TCP/IP packets from one to the other. The main use of QDPF is to expose corporate or Intranet services to the Internet, by running it on an intervening machine. QDPF is a Java console application.

Added 2002-05-01
by Tomas Svensson
TLSWrap is a TLS/SSL FTP wrapper/proxy for UNIX and WIN32, allowing you to use your favourite FTP client with any TLS/SSL-enabled FTP server. Features include full encryption of both control and data connections.

Added 2002-04-23
by UC-Davis, ucd-snmp-coders@ece.ucdavis.edu
Various tools relating to the Simple Network Management Protocol including: - An extensible agent - An SNMP library - tools to request or set information from SNMP agents - tools to generate and handle SNMP traps - a version of the unix 'netstat' command using SNMP - a Tk/perl mib browser This package was originally based on the Carnegie Mellon University SNMP implementation, but has been greatly enhanced, ported, fixed, made easier to use and barely resembles the original package anymore.

Internet Predator
Added 2002-04-22
by Futures Inc. Predator Team
I.P. will assist Penetration Engineers with vital information about a client's network, while also assisting companies with information about their competitors. I.P. can also aid companies in finding out where on the Internet their systems have been as well as find out what their employees are talking about which may be proprietary company information.

Added 2002-04-17
by Arne Vidstrom
PromiscDetect checks if your network adapter(s) is running in promiscuous mode, which may be a sign that you have a sniffer running on your computer.

Added 2002-04-16
by dugsong
fragroute intercepts, modifies, and rewrites egress traffic, implementing most of the attacks described in the Secure Networks "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection" paper. It features a simple ruleset language to delay, duplicate, drop, fragment, overlap, print, reorder, segment, source-route, or otherwise monkey with all outbound packets destined for a target host, with minimal support for randomized or probabilistic behaviour. This tool was written in good faith to aid in the testing of intrusion detection systems, firewalls, and basic TCP/IP stack behaviour.

Added 2002-04-15
by François-René Rideau
cotty is a simple command-line tool to manage pseudo-terminals. It allows users to run processes communicating with each other through their tty as opposed to files, pipes, or sockets. Its main use is to build a VPN (virtual private network) or conversely pierce a firewall.

CHX-I Packet Filter
Added 2002-04-15
by IDRCI Inc.
Designed to complement the CHX-I application firewall engine at the network level, the CHX-I Packet Filter can be used on Windows 2000/XP servers or workstations as a first level of defense. It's great graphic user interface and management flexibility allows for rapid filter creation and deployment.

OOPS Bug Tracking System
Added 2002-04-10
by Rupert Jones
OOPS is a comprehensive bug tracking system. It allows developers to track their bugs in much the same way as Bugzilla, but without all the overhead of unnecessary features.

NetSPoc (Network Security Policy Compiler)
Added 2002-04-08
by Heinz Knutzen
The Network Security Policy Compiler (NetSPoC) is a tool for security management of large computer networks with different security domains. It generates configuration files for packet filters controlling the borders of security domains. It provides its own language for describing security policy and the topology of a network. The security policy is a set of rules that state which packets are allowed to pass the network and which are not. NetSPoC is topology aware; a rule for traffic from A to B is automatically applied to all managed packet filters on the path from A to B.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus