|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FIRST <<< | PREV < | Showing items 181 to 195 | > NEXT | >>> LAST |
| SW Name | Home page | Downloaded |
|---|---|---|
| Horatio: Authenticated Network Access | http://www.cs.utexas.edu/[..]ware/horatio/ | 1940x |
| The Horatio system is a firewall authentication tool. The premise: legitimate users want to attach laptops and other mobile hosts to the network, but security demands that illegitimate users be prevented from accessing the internal, secure network and from abusing the general Internet. The approach taken by Horatio is to provide a separate, untrusted network that only connects to the internal network (and thus to the Internet) through a firewall that by default does not pass any traffic. The user must point a Web browser at the Horatio web server, which runs on the firewall machine, and provide a username and password. | ||
|
|
Directory Watcher | http://pedram.redhive.com/ | 1939x |
| Directory Watcher was written to aid in the discovery of race conditions. It has multiple speed settings, the fastest of which can even catch a successive link() unlink(). It also has the ability to filter files based on user, group, suid bit, and wildcard (*?) file names. | ||
|
|
Tknetbus | http://computer.freepage.de/linux-azubi/ | 1939x |
| Tcl/TK-Client for the netbusserver, a trojan which allows intruders to control the computer with netbusservers running on | ||
|
|
pam_ccreds | http://www.padl.com/[..]m_ccreds.html | 1937x |
| The pam_ccreds module provides the means for Linux workstations to locally authenticate using an enterprise identity when the network is unavailable. | ||
|
|
authforce | http://kapheine.hypa.net/authforce/ | 1935x |
| Authforce is an HTTP authentication brute forcer. Using various methods, it attempts brute force username and password pairs for a site. | ||
|
|
squidefender | http://www.jeroen.se/[..]idefender.php | 1935x |
| Squidefender is a perl script which parses a squid log file in native format for attacks. | ||
|
|
SRP | http://srp.stanford.edu/ | 1935x |
| SRP is a secure password-based authentication and key-exchange protocol. | ||
|
|
Worm Warner | http://www.jeroen.se/ | 1933x |
| WormWarner is a tool designed to warn hosts that are probably infected by worms. | ||
|
|
ADMsmb | http://www.void.irq.org/ | 1932x |
| ADMsmb is a security scanner for Samba based on the source of smbclient. It will get the netbios name, share list, workgroup, domain, and OS. | ||
|
|
Adeos Filesystem Security Scanner | http://linux.wku.edu/[..]ftware/adeos/ | 1930x |
| Adeos Filesystem Security Scanner is an automated filesystem security scanner. It recursively walks all mounted filesystems on the local system, and attempts to identify common security concerns, such as SUID, and world-writeable files. | ||
|
|
SMTarPit | http://www.fresh.files2.serveftp.net/smtarpit/ | 1929x |
| SMTarPit is a combined SMTP honeypot and tarpit released under the GPL. It is writen in Perl so it should work on virtually any platform that supports Perl (except Windows). | ||
|
|
fragroute | http://www.monkey.org/[..]ng/fragroute/ | 1928x |
| fragroute intercepts, modifies, and rewrites egress traffic, implementing most of the attacks described in the Secure Networks "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection" paper. | ||
|
|
Medusa DS9 | http://medusa.terminus.sk/ | 1927x |
| Medusa DS9 is used to increase Linux's security. It consists of two major parts, Linux kernel changes and the user-space daemon. | ||
|
|
NuFW | http://www.nufw.org/[..].php3?lang=en | 1925x |
| NuFW is an enterprise grade firewall that performs an authentication of every single connection passing through the IP filter, by transparently requesting user’s credentials before any filtering decision is taken. | ||
|
|
TEA Total | http://www.linuxhacker.org/tea-total/ | 1924x |
| TEA Total is a very small 128 bit private key based encryption/decryption system which uses the block variant of TEA (Tiny Encryption Algorithm) | ||
|
|
||
| FIRST <<< | PREV < | Showing items 181 to 195 | > NEXT | >>> LAST |
| 1. |
Pacman linux Download: 5804x |
| 2. |
FreeBSD Download: 10038x |
| 3. |
PCLinuxOS-2010 Download: 9528x |
| 4. |
alcolix Download: 12100x |
| 5. |
Onebase Linux Download: 10810x |
| 6. |
Novell Linux Desktop Download: 0x |
| 7. |
KateOS Download: 7240x |
| 1. |
xinetd Download: 3380x |
| 2. |
RDGS Download: 937x |
| 3. |
spkg Download: 6407x |
| 4. |
LinPacker Download: 11661x |
| 5. |
VFU File Manager Download: 3975x |
| 6. |
LeftHand Mała Księgowość Download: 8319x |
| 7. |
MISU pyFotoResize Download: 3683x |
| 8. |
Lefthand CRM Download: 4508x |
| 9. |
MetadataExtractor Download: 0x |
| 10. |
RCP100 Download: 4056x |
| 11. |
Predaj softveru Download: 0x |
| 12. |
MSH Free Autoresponder Download: 0x |
linuxsoft.cz
| Design: www.megadesign.cz