|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FIRST <<< | PREV < | Showing items 481 to 495 | > NEXT | >>> LAST |
| SW Name | Home page | Downloaded |
|---|---|---|
| ADMsmb | http://www.void.irq.org/ | 1973x |
| ADMsmb is a security scanner for Samba based on the source of smbclient. It will get the netbios name, share list, workgroup, domain, and OS. | ||
|
|
THC-Dialup Login Hacker | http://www.thc.org | 1972x |
| Long, long time ago, we released a tool called Login Hacker, for penetrating dialup modems. Today we are releasing a similar and easier tool for Linux which does the same job better. All you need is UNIX and minicom. Have fun with this little release! | ||
|
|
Poppassd-Expect | http://hinst.net/[..]passd-expect/ | 1971x |
| Poppassd-Expect is a clone of the original poppassd program, which is written in C. | ||
|
|
SMTarPit | http://www.fresh.files2.serveftp.net/smtarpit/ | 1970x |
| SMTarPit is a combined SMTP honeypot and tarpit released under the GPL. It is writen in Perl so it should work on virtually any platform that supports Perl (except Windows). | ||
|
|
Directory Watcher | http://pedram.redhive.com/ | 1970x |
| Directory Watcher was written to aid in the discovery of race conditions. It has multiple speed settings, the fastest of which can even catch a successive link() unlink(). It also has the ability to filter files based on user, group, suid bit, and wildcard (*?) file names. | ||
|
|
fragroute | http://www.monkey.org/[..]ng/fragroute/ | 1969x |
| fragroute intercepts, modifies, and rewrites egress traffic, implementing most of the attacks described in the Secure Networks "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection" paper. | ||
|
|
Medusa DS9 | http://medusa.terminus.sk/ | 1968x |
| Medusa DS9 is used to increase Linux's security. It consists of two major parts, Linux kernel changes and the user-space daemon. | ||
|
|
ModSecurity | http://www.modsecurity.org/ | 1967x |
| ModSecurity is an intrusion detection and prevention engine for Web applications. Operating as an Apache module or Java Servlet filter, its purpose is to increase Web application security, protecting Web applications from known and unknown attacks. | ||
|
|
THC-FuzzyFingerprint | http://www.thc.org/ | 1965x |
| This little tool generates fuzzy fingerprints. | ||
|
|
THC-Amap | http://www.thc.org/ | 1959x |
| Amap is a next-generation scanning tool, which identifies applications and services. | ||
|
|
ISIC | http://packages.debian.org/[..]/net/isic.htm | 1959x |
| ISIC (and components) is intended to test the integrity of an IP Stack and its component stacks (TCP, UDP, ICMP et. al.) It does this by generating controlled random packets. You can use ISIC for testing if a firewall leaks packets, or how well an IDS functions. | ||
|
|
leetnet | http://www.leetnet.org/ | 1957x |
| Leetnet is a dynamic network of small networks connected securely via the Internet using the IPSEC protocol. Managed by a central web interface and database, all networks can establish secure IPSEC VPN connections despite such complications as dynamic IP addresses, different IPSEC implementations, large numbers of tunnels, multiple users, and overall complexity related to IPSEC VPN use. Leetnet also serves as a central registrar for private networks, guaranteeing network uniqueness and connectivity with other Leetnet networks. | ||
|
|
FakeBO | http://cvs.linux.hr/fakebo/ | 1951x |
| This program fakes trojan servers and logs every attempt from client. It is possible to log attempts to file, stdout, stderr or to syslog. It can send fake pings and replies back to trojan client. | ||
|
|
JailTool | http://www.westfalen.de/~gb/ | 1951x |
| JailTool is a script that creates a full chroot environment out of a declarative .jail file. To accomplish this it uses available package registration databases like the dpkg database and Perl CPAN .packlist files to create lists of files to be copied. | ||
|
|
DX-PKI | http://www.idealx.org/prj/ | 1946x |
| IDX-PKI is an Open Source implementation of a Public Key Infrastructure which aims to be IETF compliant for PKIX recommendations. IDX-PKI is routinely used by companies and public agencies. | ||
|
|
||
| FIRST <<< | PREV < | Showing items 481 to 495 | > NEXT | >>> LAST |
| 1. |
Pacman linux Download: 5884x |
| 2. |
FreeBSD Download: 10102x |
| 3. |
PCLinuxOS-2010 Download: 9588x |
| 4. |
alcolix Download: 12205x |
| 5. |
Onebase Linux Download: 10956x |
| 6. |
Novell Linux Desktop Download: 0x |
| 7. |
KateOS Download: 7327x |
| 1. |
xinetd Download: 3544x |
| 2. |
RDGS Download: 937x |
| 3. |
spkg Download: 6596x |
| 4. |
LinPacker Download: 11830x |
| 5. |
VFU File Manager Download: 4033x |
| 6. |
LeftHand Mała Księgowość Download: 8411x |
| 7. |
MISU pyFotoResize Download: 3763x |
| 8. |
Lefthand CRM Download: 4576x |
| 9. |
MetadataExtractor Download: 0x |
| 10. |
RCP100 Download: 4136x |
| 11. |
Predaj softveru Download: 0x |
| 12. |
MSH Free Autoresponder Download: 0x |
linuxsoft.cz
| Design: www.megadesign.cz