SW Name |
Home page |
Downloaded |
ModSecurity |
http://www.modsecurity.org/ |
1403x |
ModSecurity is an intrusion detection and prevention engine for Web applications. Operating as an Apache module or Java Servlet filter, its purpose is to increase Web application security, protecting Web applications from known and unknown attacks.
|
|
FakeBO |
http://cvs.linux.hr/fakebo/ |
1403x |
This program fakes trojan servers and logs every attempt from client. It is possible to log attempts to file, stdout, stderr or to syslog. It can send fake pings and replies back to trojan client.
|
|
triggers |
http://www.igmus.org/code/ |
1402x |
A trigger is a lightweight, asynchronous notification mechanism to set off events in and across systems.
|
|
Directory Watcher |
http://pedram.redhive.com/ |
1400x |
Directory Watcher was written to aid in the discovery of race conditions. It has multiple speed settings, the fastest of which can even catch a successive link() unlink(). It also has the ability to filter files based on user, group, suid bit, and wildcard (*?) file names.
|
|
PScan |
http://www.striker.ottawa.on.ca/[..]~aland/pscan/ |
1400x |
PScan scans C source files for problematic uses of printf style functions, such as "sprintf(buffer, variable);" instead of "sprintf(buffer, "", variable);". These sort of problems have been the source of many security holes. PSCan looks for them, and nothing else. It does not make your program safe, but it can help to make it safer.
|
|
SMTarPit |
http://www.fresh.files2.serveftp.net/smtarpit/ |
1399x |
SMTarPit is a combined SMTP honeypot and tarpit released under the GPL. It is writen in Perl so it should work on virtually any platform that supports Perl (except Windows).
|
|
Cmb |
http://members.optushome.com.au/[..]software.html |
1399x |
Cmb is a small utility that creates all the possible combinations from a user mask (that includes wildcards) and dumps them to stdout
|
|
yyyRSA |
http://www.erikyyy.de/yyyRSA/ |
1398x |
A simple program to encrypt and decipher messages with
the RSA asymetrical encryption algorithm.
|
|
squidefender |
http://www.jeroen.se/[..]idefender.php |
1397x |
Squidefender is a perl script which parses a squid log file in native format for attacks.
|
|
authforce |
http://kapheine.hypa.net/authforce/ |
1396x |
Authforce is an HTTP authentication brute forcer. Using various methods, it attempts brute force username and password pairs for a site.
|
|
keymgr |
http://www.rcpt.to/keymgr/ |
1395x |
Keymgr is a cryptographic policy engine.
|
|
Horatio: Authenticated Network Access |
http://www.cs.utexas.edu/[..]ware/horatio/ |
1392x |
The Horatio system is a firewall authentication tool. The premise: legitimate users want to attach laptops and other mobile hosts to the network, but security demands that illegitimate users be prevented from accessing the internal, secure network and from abusing the general Internet. The approach taken by Horatio is to provide a separate, untrusted network that only connects to the internal network (and thus to the Internet) through a firewall that by default does not pass any traffic. The user must point a Web browser at the Horatio web server, which runs on the firewall machine, and provide a username and password.
|
|
fragroute |
http://www.monkey.org/[..]ng/fragroute/ |
1391x |
fragroute intercepts, modifies, and rewrites egress traffic, implementing most of the attacks described in the Secure Networks "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection" paper.
|
|
leetnet |
http://www.leetnet.org/ |
1391x |
Leetnet is a dynamic network of small networks connected securely via the Internet using the IPSEC protocol. Managed by a central web interface and database, all networks can establish secure IPSEC VPN connections despite such complications as dynamic IP addresses, different IPSEC implementations, large numbers of tunnels, multiple users, and overall complexity related to IPSEC VPN use. Leetnet also serves as a central registrar for private networks, guaranteeing network uniqueness and connectivity with other Leetnet networks.
|
|
CODEX |
http://www.umiacs.umd.edu/[..]mmarsh/CODEX/ |
1391x |
CODEX is designed for applications with a moderate number of clients (tens or hundreds) requesting keys that change often but not continuously (on the scale of minutes to hours).
|
|