SW Name |
Home page |
Downloaded |
fe3d |
http://projects.icapsid.net/fe3d/ |
1415x |
fe3d is a 3D visualization tool for network (security) information. It has support for nmap and (limited) support for languard XML log files.
|
|
Tunnel Vision |
http://open.nit.ca/[..]=TunnelVision |
1414x |
TunnelVision creates an encrypted VirtualPrivateNetwork, or VPN, between two Tunnel Vision-capable sites on the Internet.
|
|
IPFC |
http://www.conostix.com/ipfc/ |
1414x |
IPFC is a software and framework to manage and monitor multiple types of security modules across a global network.
|
|
fcatalog |
http://fcatalog.lupine.org/ |
1413x |
fcatalog is a program for identifying the origins of files. Though its operation is similar to the operation of file-checksum-checking security utilities (like tripwire), its purpose and methodology is different.
|
|
OpenSSH SecurID patch |
http://www.omniti.com/[..]sus/projects/ |
1412x |
This patch integrates SecurID authentication services directly into the OpenSSH daemon, allowing users to use SecurID tokens directly as their passwords instead of relying on the clunky sdshell.
|
|
Riley |
http://www3.telus.net/[..]er/riley.html |
1412x |
Riley is a file integrity checker written in Perl,somewhat similar to Tripwire.
|
|
SafeRelay |
http://users.pandora.be/[..]aferelay.html |
1411x |
SafeRelay is a certificate authority center, based on OpenSSL, for network administrators who want to deploy certificates on a LAN (local area network).
|
|
attackwatch |
http://www.bedatec.de/[..]ft/index.html |
1409x |
Analyzes the firewall-output in near-realtime and will run scripts in response to incoming packets that got logged
|
|
LinVPN |
http://mrtg.planetmirror.com/pub/linvpn/ |
1408x |
LinVPN allows you to create a VPN (Virtual Private Network) from linux to linux. Normally both are gateways of a LAN, then the LANs behind them may access each other over an encrypted tunnel created by the software.
|
|
ISIC |
http://packages.debian.org/[..]/net/isic.htm |
1405x |
ISIC (and components) is intended to test the integrity of an IP Stack and its component stacks (TCP, UDP, ICMP et. al.) It does this by generating controlled random packets. You can use ISIC for testing if a firewall leaks packets, or how well an IDS functions.
|
|
ModSecurity |
http://www.modsecurity.org/ |
1404x |
ModSecurity is an intrusion detection and prevention engine for Web applications. Operating as an Apache module or Java Servlet filter, its purpose is to increase Web application security, protecting Web applications from known and unknown attacks.
|
|
FakeBO |
http://cvs.linux.hr/fakebo/ |
1404x |
This program fakes trojan servers and logs every attempt from client. It is possible to log attempts to file, stdout, stderr or to syslog. It can send fake pings and replies back to trojan client.
|
|
triggers |
http://www.igmus.org/code/ |
1402x |
A trigger is a lightweight, asynchronous notification mechanism to set off events in and across systems.
|
|
Directory Watcher |
http://pedram.redhive.com/ |
1400x |
Directory Watcher was written to aid in the discovery of race conditions. It has multiple speed settings, the fastest of which can even catch a successive link() unlink(). It also has the ability to filter files based on user, group, suid bit, and wildcard (*?) file names.
|
|
PScan |
http://www.striker.ottawa.on.ca/[..]~aland/pscan/ |
1400x |
PScan scans C source files for problematic uses of printf style functions, such as "sprintf(buffer, variable);" instead of "sprintf(buffer, "", variable);". These sort of problems have been the source of many security holes. PSCan looks for them, and nothing else. It does not make your program safe, but it can help to make it safer.
|
|