![]() |
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() ![]() ![]() |
|
FIRST <<< | PREV < | Showing items 106 to 120 | > NEXT | >>> LAST |
SW Name | Home page | Downloaded |
---|---|---|
Impost | http://impost.sourceforge.net/ | 1817x |
Impost is a network security auditing tool designed to analyze the forensics behind compromised and/or vulnerable daemons. There are two different kinds of operating modes; it can either act as a honey pot and take orders from a Perl script controlling how it responds and communicates with connecting clients, or it can operate as a packet sniffer and monitor incoming data to specified destination port. | ||
|
HTun | http://htun.runslinux.net/ | 1816x |
HTun is a tool to allow you to create a fully bidirectional IP VPN over an HTTP proxy or just over port 80, allowing you to bypass restrictive firewalls and use any service you desire. HTun creates an point-to-point virtual IP network over HTTP by encapsulating IP traffic into valid HTTP requests. The HTun server runs on a host with an unrestricted Internet connection. It listens on a common webserver port (80 or 443) and accepts HTun client connections. The HTun client daemon runs from within a restrictive network environment, communicating with the HTun server over an HTTP proxy. | ||
|
Yin Yang | http://yinyang.sourceforge.net/ | 1815x |
Yin Yang is a real-time Linux file scanner that is activated whenever a file is accessed. When a file opening system call is detected, it will send the full pathname of the file to a network daemon. The network daemon will then pass the pathname of the file to a file scanner, such as an anti-virus scanner, and return the status. | ||
|
aggregate | http://www.vergenet.net/[..]ux/aggregate/ | 1815x |
Aggregate is a tool for aggregating CIDR networks. Input is read from stdin and output is written to stdout. | ||
|
Ciphire Mail | http://www.ciphire.com/ | 1811x |
Ciphire Mail is an email encryption tool. It works in conjunction with your existing email client. | ||
|
Secure back door | http://sbd.sourceforge.net/ | 1808x |
Secure Back Door (SBD) is a tool that provides ultra-secure and minimal access to a computer, which allows you to run a single command based on a one time key. | ||
|
KWoodhammer | http://kwoodhammer.sourceforge.net/ | 1803x |
KWoodhammer is the all-in-one solution for traditional encryption methods as you know from Enigma, the Pope or the Russian Secret Service (KGB). | ||
|
SSHTerm | http://www.sshtools.com/ | 1803x |
SSHTerm is a Java SSH terminal that provides a whole range of features including port forwarding, password and public-key authentication, full clipboard support and many others. | ||
|
Network Security Analysis Tool | http://nsat.sourceforge.net/ | 1802x |
nsat is a fast, stable bulk security scanner designed to audit remote network services and check for versions, security problems, gather information about the servers and the machine, and much more. | ||
|
yersinia | http://yersinia.sourceforge.net/ | 1792x |
Yersinia is a network tool designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. | ||
|
pixiliate | http://winfingerprint.sourceforge.net/pixilate.php | 1791x |
Pixilate is a commandline packet generation utility that reads Cisco PIX 6.2x or Cisco IOS ACLs as input and generates the appropriate packets. | ||
|
md5mon | http://www.geocities.com/[..]1/md5mon.html | 1791x |
It checks that certain system files have not been modified and it uses "md5sum" to compute checksums of files, reporting any differences from previously recorded checksums. Optionally, a somewhat more secure, but slower, "shasum" can be used instead of "md5sum". | ||
|
ProSum | http://prosum.sourceforge.net/ | 1785x |
ProSum is a terminal based program that protects your files, sys_call_table and IDT like tripwire way (All in user space, without kernel modules) In addition, database with files etc. could be encrypted with Blowfish algorythm and more. | ||
|
Panoptis | http://sourceforge.net/[..]ects/panoptis | 1783x |
Panoptis plans to create a network security tool (N-IDS) to detect and block DoS and DDoS attacks. The programming language is C++, and the input is being provided by routers. | ||
|
Network Security Monitor Daemon | http://sourceforge.net/[..]cts/monitord/ | 1781x |
The Network Security Monitor Daemon is a lightweight network security monitor for TCP/IP LANs. It will capture certain network events and record them in a relational database. The recorded data will be available for analysis through a CGI-based interface. | ||
|
FIRST <<< | PREV < | Showing items 106 to 120 | > NEXT | >>> LAST |
1. |
Pacman linux Download: 5109x |
2. |
FreeBSD Download: 9323x |
3. |
PCLinuxOS-2010 Download: 8815x |
4. |
alcolix Download: 11203x |
5. |
Onebase Linux Download: 9921x |
6. |
Novell Linux Desktop Download: 0x |
7. |
KateOS Download: 6478x |
1. |
xinetd Download: 2638x |
2. |
RDGS Download: 937x |
3. |
spkg Download: 5276x |
4. |
LinPacker Download: 10416x |
5. |
VFU File Manager Download: 3405x |
6. |
LeftHand Mała Księgowość Download: 7505x |
7. |
MISU pyFotoResize Download: 3106x |
8. |
Lefthand CRM Download: 3769x |
9. |
MetadataExtractor Download: 0x |
10. |
RCP100 Download: 3391x |
11. |
Predaj softveru Download: 0x |
12. |
MSH Free Autoresponder Download: 0x |