SW Name |
Home page |
Downloaded |
Tunnel Vision |
http://open.nit.ca/[..]=TunnelVision |
1430x |
TunnelVision creates an encrypted VirtualPrivateNetwork, or VPN, between two Tunnel Vision-capable sites on the Internet.
|
|
fcatalog |
http://fcatalog.lupine.org/ |
1427x |
fcatalog is a program for identifying the origins of files. Though its operation is similar to the operation of file-checksum-checking security utilities (like tripwire), its purpose and methodology is different.
|
|
IPFC |
http://www.conostix.com/ipfc/ |
1427x |
IPFC is a software and framework to manage and monitor multiple types of security modules across a global network.
|
|
fe3d |
http://projects.icapsid.net/fe3d/ |
1426x |
fe3d is a 3D visualization tool for network (security) information. It has support for nmap and (limited) support for languard XML log files.
|
|
SafeRelay |
http://users.pandora.be/[..]aferelay.html |
1424x |
SafeRelay is a certificate authority center, based on OpenSSL, for network administrators who want to deploy certificates on a LAN (local area network).
|
|
attackwatch |
http://www.bedatec.de/[..]ft/index.html |
1423x |
Analyzes the firewall-output in near-realtime and will run scripts in response to incoming packets that got logged
|
|
Riley |
http://www3.telus.net/[..]er/riley.html |
1422x |
Riley is a file integrity checker written in Perl,somewhat similar to Tripwire.
|
|
LinVPN |
http://mrtg.planetmirror.com/pub/linvpn/ |
1422x |
LinVPN allows you to create a VPN (Virtual Private Network) from linux to linux. Normally both are gateways of a LAN, then the LANs behind them may access each other over an encrypted tunnel created by the software.
|
|
OpenSSH SecurID patch |
http://www.omniti.com/[..]sus/projects/ |
1421x |
This patch integrates SecurID authentication services directly into the OpenSSH daemon, allowing users to use SecurID tokens directly as their passwords instead of relying on the clunky sdshell.
|
|
triggers |
http://www.igmus.org/code/ |
1418x |
A trigger is a lightweight, asynchronous notification mechanism to set off events in and across systems.
|
|
FakeBO |
http://cvs.linux.hr/fakebo/ |
1415x |
This program fakes trojan servers and logs every attempt from client. It is possible to log attempts to file, stdout, stderr or to syslog. It can send fake pings and replies back to trojan client.
|
|
Cmb |
http://members.optushome.com.au/[..]software.html |
1413x |
Cmb is a small utility that creates all the possible combinations from a user mask (that includes wildcards) and dumps them to stdout
|
|
keymgr |
http://www.rcpt.to/keymgr/ |
1412x |
Keymgr is a cryptographic policy engine.
|
|
SMTarPit |
http://www.fresh.files2.serveftp.net/smtarpit/ |
1412x |
SMTarPit is a combined SMTP honeypot and tarpit released under the GPL. It is writen in Perl so it should work on virtually any platform that supports Perl (except Windows).
|
|
ISIC |
http://packages.debian.org/[..]/net/isic.htm |
1412x |
ISIC (and components) is intended to test the integrity of an IP Stack and its component stacks (TCP, UDP, ICMP et. al.) It does this by generating controlled random packets. You can use ISIC for testing if a firewall leaks packets, or how well an IDS functions.
|
|