|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FIRST <<< | PREV < | Showing items 106 to 120 | > NEXT | >>> LAST |
| SW Name | Home page | Downloaded |
|---|---|---|
| HTun | http://htun.runslinux.net/ | 2277x |
| HTun is a tool to allow you to create a fully bidirectional IP VPN over an HTTP proxy or just over port 80, allowing you to bypass restrictive firewalls and use any service you desire. HTun creates an point-to-point virtual IP network over HTTP by encapsulating IP traffic into valid HTTP requests. The HTun server runs on a host with an unrestricted Internet connection. It listens on a common webserver port (80 or 443) and accepts HTun client connections. The HTun client daemon runs from within a restrictive network environment, communicating with the HTun server over an HTTP proxy. | ||
|
|
Bait and Switch Honeypot System | http://baitnswitch.sourceforge.net/ | 2275x |
| The Bait and Switch Honeypot System combines the snort Intrusion Detection System (IDS) with honeypot technology to create a system that reacts to hostile intrusion attempts by marking and then redirecting all "bad" traffic to a honeypot that partially mirrors your production system. | ||
|
|
AESCrypt | http://aescrypt.sourceforge.net/ | 2274x |
| Small stream encryption program for Unix | ||
|
|
Lutz | http://www.codewear.org/[..]s.php?id=lutz | 2272x |
| Lutz is a fast and small port scanner, similar to nmap. It has the most popular scanning options (SYN, FIN, XMAS Scan, PROTO Scan, etc.) and simple OS detection. | ||
|
|
Secure back door | http://sbd.sourceforge.net/ | 2263x |
| Secure Back Door (SBD) is a tool that provides ultra-secure and minimal access to a computer, which allows you to run a single command based on a one time key. | ||
|
|
Impost | http://impost.sourceforge.net/ | 2262x |
| Impost is a network security auditing tool designed to analyze the forensics behind compromised and/or vulnerable daemons. There are two different kinds of operating modes; it can either act as a honey pot and take orders from a Perl script controlling how it responds and communicates with connecting clients, or it can operate as a packet sniffer and monitor incoming data to specified destination port. | ||
|
|
Yin Yang | http://yinyang.sourceforge.net/ | 2262x |
| Yin Yang is a real-time Linux file scanner that is activated whenever a file is accessed. When a file opening system call is detected, it will send the full pathname of the file to a network daemon. The network daemon will then pass the pathname of the file to a file scanner, such as an anti-virus scanner, and return the status. | ||
|
|
md5mon | http://www.geocities.com/[..]1/md5mon.html | 2259x |
| It checks that certain system files have not been modified and it uses "md5sum" to compute checksums of files, reporting any differences from previously recorded checksums. Optionally, a somewhat more secure, but slower, "shasum" can be used instead of "md5sum". | ||
|
|
Stunnel | http://www.stunnel.org/ | 2259x |
| Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code. | ||
|
|
KWoodhammer | http://kwoodhammer.sourceforge.net/ | 2257x |
| KWoodhammer is the all-in-one solution for traditional encryption methods as you know from Enigma, the Pope or the Russian Secret Service (KGB). | ||
|
|
yersinia | http://yersinia.sourceforge.net/ | 2255x |
| Yersinia is a network tool designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. | ||
|
|
Panoptis | http://sourceforge.net/[..]ects/panoptis | 2247x |
| Panoptis plans to create a network security tool (N-IDS) to detect and block DoS and DDoS attacks. The programming language is C++, and the input is being provided by routers. | ||
|
|
fEncH | http://serbianc.sourceforge.net/[..]rojects/fEncH | 2245x |
| This is a fast and simple, yet hard to crack encryption program. It uses XOR encryption with variable key, based on the password that user inputs to the program, it rumbles bits in the bytes, etc. | ||
|
|
GNU Privacy Assistant | http://www.gnupg.org/[..]software/gpa/ | 2243x |
| The GNU Privacy Assistant (GPA) is a graphical user interface for the GnuPG (GNU Privacy Guard). | ||
|
|
Ciphire Mail | http://www.ciphire.com/ | 2239x |
| Ciphire Mail is an email encryption tool. It works in conjunction with your existing email client. | ||
|
|
||
| FIRST <<< | PREV < | Showing items 106 to 120 | > NEXT | >>> LAST |
| 1. |
Pacman linux Download: 5893x |
| 2. |
FreeBSD Download: 10111x |
| 3. |
PCLinuxOS-2010 Download: 9594x |
| 4. |
alcolix Download: 12220x |
| 5. |
Onebase Linux Download: 10978x |
| 6. |
Novell Linux Desktop Download: 0x |
| 7. |
KateOS Download: 7337x |
| 1. |
xinetd Download: 3555x |
| 2. |
RDGS Download: 937x |
| 3. |
spkg Download: 6609x |
| 4. |
LinPacker Download: 11836x |
| 5. |
VFU File Manager Download: 4040x |
| 6. |
LeftHand Mała Księgowość Download: 8415x |
| 7. |
MISU pyFotoResize Download: 3766x |
| 8. |
Lefthand CRM Download: 4581x |
| 9. |
MetadataExtractor Download: 0x |
| 10. |
RCP100 Download: 4142x |
| 11. |
Predaj softveru Download: 0x |
| 12. |
MSH Free Autoresponder Download: 0x |
linuxsoft.cz
| Design: www.megadesign.cz