|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FIRST <<< | PREV < | Showing items 436 to 450 | > NEXT | >>> LAST |
| SW Name | Home page | Downloaded |
|---|---|---|
| fcatalog | http://fcatalog.lupine.org/ | 1867x |
| fcatalog is a program for identifying the origins of files. Though its operation is similar to the operation of file-checksum-checking security utilities (like tripwire), its purpose and methodology is different. | ||
|
|
trapdoor2 | http://oss.linbit.com/trapdoor2/ | 1865x |
| Trapdoor2 (td2) allows remote users to execute local commands by sending 'magic cookies'. this can e.g. be used to alter local firewalling rules so people can connect to local services after sending the magick cookie. | ||
|
|
pyCA | http://www.pyca.de/ | 1865x |
| pyCA tries to make it easier for people to set up and run a organizational certificate authority which fulfills the need for a fairly secure certification processing. | ||
|
|
PGP | http://www.pgpi.org/ | 1864x |
| Tool for secure datas - mainly e-mail communication. Basic version free. | ||
|
|
THC-Rut | http://www.thc.org | 1860x |
| THC-RUT (aRe yoU There, pronouced as root) is your first knife on foreign network. It gathers informations from local and remote networks. It offers a wide range of network discovery tools: arp lookup on an IP range, spoofed DHCP request, RARP, BOOTP, ICMP-ping, ICMP address mask request, OS fingerprintings, high-speed host discovery, ... The tool is capable of discovering a Class B network within 10 minutes. | ||
|
|
LinVPN | http://mrtg.planetmirror.com/pub/linvpn/ | 1860x |
| LinVPN allows you to create a VPN (Virtual Private Network) from linux to linux. Normally both are gateways of a LAN, then the LANs behind them may access each other over an encrypted tunnel created by the software. | ||
|
|
THC-Vmap | http://www.thc.org | 1859x |
| Vmap stands for version mapper. It allows you to find out the version of a daemon by fingerprinting the features and replys of bogus commands. It's a great addition to the other *map tools. | ||
|
|
THC-UnixHackingTools | http://www.thc.org | 1857x |
| Unix rootkit. | ||
|
|
THC-SecureDelete | http://www.thc.org/ | 1855x |
| Tool for secure deleting files. | ||
|
|
chkrootkit | http://www.chkrootkit.org/ | 1854x |
| chkrootkit is a tool to locally check for signs of a rootkit. It contains a chkrootkit: shell script that checks system binaries for rootkit modification. The following tests are made: aliens, asp, bindshell, lkm, rexedcs, sniffer, wted, z2, amd, basename, biff, chfn, chsh, cron, date, du, dirname, echo, egrep, env, find, fingerd, gpm, grep, hdparm, su, ifconfig, inetd, inetdconf, identd, killall, login, ls, mail, mingetty, netstat, named, passwd, pidof, pop2, pop3, ps, pstree, rpcinfo, rlogind, rshd, slogin, sendmail, sshd, syslogd, tar, tcpd, top, telnetd, timed, traceroute, and write. | ||
|
|
authd_ | http://69.56.132.179/~ury/ | 1852x |
| authd_ is an auth daemon for Linux. It operates without using the SUID bit on executables, and it supports the PAM and NSS interfaces, /etc/passwd, /etc/shadow, and MySQL for storing user information. | ||
|
|
THC-WarDrive | http://www.thc.org | 1852x |
| The major focus of THC is to investigate and analyze common security solutions and propose concepts for circumventing security mechanisms. | ||
|
|
fe3d | http://projects.icapsid.net/fe3d/ | 1850x |
| fe3d is a 3D visualization tool for network (security) information. It has support for nmap and (limited) support for languard XML log files. | ||
|
|
Riley | http://www3.telus.net/[..]er/riley.html | 1847x |
| Riley is a file integrity checker written in Perl,somewhat similar to Tripwire. | ||
|
|
KPGPCrypt | http://members.tripod.com/[..]ssi/index.htm | 1846x |
| Key Managment for PGP 5.xx, PGP 6.xx and GPG 1.xx. Supports Add, Delete, Sign, Revoke, Disable Enable keys in graphical environment | ||
|
|
||
| FIRST <<< | PREV < | Showing items 436 to 450 | > NEXT | >>> LAST |
| 1. |
Pacman linux Download: 5628x |
| 2. |
FreeBSD Download: 9845x |
| 3. |
PCLinuxOS-2010 Download: 9332x |
| 4. |
alcolix Download: 11845x |
| 5. |
Onebase Linux Download: 10521x |
| 6. |
Novell Linux Desktop Download: 0x |
| 7. |
KateOS Download: 7002x |
| 1. |
xinetd Download: 3113x |
| 2. |
RDGS Download: 937x |
| 3. |
spkg Download: 6080x |
| 4. |
LinPacker Download: 11306x |
| 5. |
VFU File Manager Download: 3823x |
| 6. |
LeftHand Mała Księgowość Download: 8099x |
| 7. |
MISU pyFotoResize Download: 3535x |
| 8. |
Lefthand CRM Download: 4335x |
| 9. |
MetadataExtractor Download: 0x |
| 10. |
RCP100 Download: 3855x |
| 11. |
Predaj softveru Download: 0x |
| 12. |
MSH Free Autoresponder Download: 0x |
linuxsoft.cz
| Design: www.megadesign.cz