|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FIRST <<< | PREV < | Showing items 106 to 120 | > NEXT | >>> LAST |
| SW Name | Home page | Downloaded |
|---|---|---|
| Impost | http://impost.sourceforge.net/ | 2051x |
| Impost is a network security auditing tool designed to analyze the forensics behind compromised and/or vulnerable daemons. There are two different kinds of operating modes; it can either act as a honey pot and take orders from a Perl script controlling how it responds and communicates with connecting clients, or it can operate as a packet sniffer and monitor incoming data to specified destination port. | ||
|
|
KWoodhammer | http://kwoodhammer.sourceforge.net/ | 2050x |
| KWoodhammer is the all-in-one solution for traditional encryption methods as you know from Enigma, the Pope or the Russian Secret Service (KGB). | ||
|
|
Secure back door | http://sbd.sourceforge.net/ | 2049x |
| Secure Back Door (SBD) is a tool that provides ultra-secure and minimal access to a computer, which allows you to run a single command based on a one time key. | ||
|
|
cryptoswap | http://www.flyn.org/[..]ap/index.html | 2049x |
| The cryptoswap package supports building an encrypted swap partition when a system boots. This may be necessary on systems that use encrypted filesystems because plaintext secrets may be written to disk when memory is swapped to disk. | ||
|
|
yersinia | http://yersinia.sourceforge.net/ | 2048x |
| Yersinia is a network tool designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. | ||
|
|
Yin Yang | http://yinyang.sourceforge.net/ | 2047x |
| Yin Yang is a real-time Linux file scanner that is activated whenever a file is accessed. When a file opening system call is detected, it will send the full pathname of the file to a network daemon. The network daemon will then pass the pathname of the file to a file scanner, such as an anti-virus scanner, and return the status. | ||
|
|
GNU Privacy Assistant | http://www.gnupg.org/[..]software/gpa/ | 2045x |
| The GNU Privacy Assistant (GPA) is a graphical user interface for the GnuPG (GNU Privacy Guard). | ||
|
|
Network Security Analysis Tool | http://nsat.sourceforge.net/ | 2045x |
| nsat is a fast, stable bulk security scanner designed to audit remote network services and check for versions, security problems, gather information about the servers and the machine, and much more. | ||
|
|
pixiliate | http://winfingerprint.sourceforge.net/pixilate.php | 2034x |
| Pixilate is a commandline packet generation utility that reads Cisco PIX 6.2x or Cisco IOS ACLs as input and generates the appropriate packets. | ||
|
|
Ciphire Mail | http://www.ciphire.com/ | 2034x |
| Ciphire Mail is an email encryption tool. It works in conjunction with your existing email client. | ||
|
|
SSHTerm | http://www.sshtools.com/ | 2029x |
| SSHTerm is a Java SSH terminal that provides a whole range of features including port forwarding, password and public-key authentication, full clipboard support and many others. | ||
|
|
NDiff | http://www.vinecorp.com/ndiff/ | 2027x |
| NDiff compares two nmap scans and outputs the differences. It allows monitoring of your network(s) for interesting changes in port states and visible hosts. NDiff eliminates the need to sift through voluminous raw scan output in search of the few noteworthy differences. | ||
|
|
ptSCP | http://www.everysoft.com/ptscp/ | 2026x |
| ptSCP stands for Perl/Tk SCP. This project seeks to create an easy front-end to secure file transfers using scp and ssh | ||
|
|
Panoptis | http://sourceforge.net/[..]ects/panoptis | 2025x |
| Panoptis plans to create a network security tool (N-IDS) to detect and block DoS and DDoS attacks. The programming language is C++, and the input is being provided by routers. | ||
|
|
md5mon | http://www.geocities.com/[..]1/md5mon.html | 2016x |
| It checks that certain system files have not been modified and it uses "md5sum" to compute checksums of files, reporting any differences from previously recorded checksums. Optionally, a somewhat more secure, but slower, "shasum" can be used instead of "md5sum". | ||
|
|
||
| FIRST <<< | PREV < | Showing items 106 to 120 | > NEXT | >>> LAST |
| 1. |
Pacman linux Download: 5546x |
| 2. |
FreeBSD Download: 9762x |
| 3. |
PCLinuxOS-2010 Download: 9255x |
| 4. |
alcolix Download: 11734x |
| 5. |
Onebase Linux Download: 10419x |
| 6. |
Novell Linux Desktop Download: 0x |
| 7. |
KateOS Download: 6921x |
| 1. |
xinetd Download: 3046x |
| 2. |
RDGS Download: 937x |
| 3. |
spkg Download: 5961x |
| 4. |
LinPacker Download: 11163x |
| 5. |
VFU File Manager Download: 3765x |
| 6. |
LeftHand Mała Księgowość Download: 8002x |
| 7. |
MISU pyFotoResize Download: 3475x |
| 8. |
Lefthand CRM Download: 4268x |
| 9. |
MetadataExtractor Download: 0x |
| 10. |
RCP100 Download: 3773x |
| 11. |
Predaj softveru Download: 0x |
| 12. |
MSH Free Autoresponder Download: 0x |
linuxsoft.cz
| Design: www.megadesign.cz