| Nazwa oprogramowania |
Strona domowa |
Pobierane |
| Tknetbus |
http://computer.freepage.de/linux-azubi/ |
1905x |
|
Tcl/TK-Client for the netbusserver, a trojan which allows intruders to control the computer with netbusservers running on
|
|
|
| Directory Watcher |
http://pedram.redhive.com/ |
1905x |
|
Directory Watcher zosał napisany do wspomagania wykrywania race conditions. Posiada wiele ustawień szybkości, najszybsza może nawet złapać sukcesywne link() unlink(). Posiada także możliwość filtrowania plików w oparciu o użytkownika, grupę, bit suid oraz nazwy plików w stylu wildcard (*?).
|
|
|
| Medusa DS9 |
http://medusa.terminus.sk/ |
1904x |
|
Medusa DS9 to narzędzie do zwiększania bezpieczeństwa Linuksa. Składa się z dwóch części - łatek na jądro Linux oraz demona trybu użytkownika.
|
|
|
| CODEX |
http://www.umiacs.umd.edu/[..]mmarsh/CODEX/ |
1900x |
|
CODEX is designed for applications with a moderate number of clients (tens or hundreds) requesting keys that change often but not continuously (on the scale of minutes to hours).
|
|
|
| ADMsmb |
http://www.void.irq.org/ |
1898x |
|
ADMsmb to skaner bezpieczeństwa dla Samby oparty o źródła smbclienta. Pobiera nazwę netbios, listę udostępnionych zasobów, grupę roboczą, domenę i OS.
|
|
|
| SRP |
http://srp.stanford.edu/ |
1897x |
|
SRP is a secure password-based authentication and key-exchange protocol.
|
|
|
| KeyNote |
http://www.cis.upenn.edu/[..]/keynote.html |
1896x |
|
KeyNote is a simple and flexible trust-management system designed to work well for a variety of large- and small- scale Internet-based applications.
|
|
|
| Adeos Filesystem Security Scanner |
http://linux.wku.edu/[..]ftware/adeos/ |
1895x |
|
Adeos Filesystem Security Scanner to zautomatyzowany skaner bezpieczeństwa. Rekursywnie przegląda wszystkie zamontowane systemy plików w systemie oraz identyfikuje typowe problemy związane z bezpieczeństwem, takie jak SUIDy i pliki zapisywalne przez wszystkich.
|
|
|
| squidefender |
http://www.jeroen.se/[..]idefender.php |
1895x |
|
Squidefender is a perl script which parses a squid log file in native format for attacks.
|
|
|
| sbd |
http://www.cycom.se/dl/sbd |
1895x |
|
Sbd is a Netcat-clone, designed to be portable and offer strong encryption. It runs on Unix-like operating systems and on Microsoft Win32
|
|
|
| Worm Warner |
http://www.jeroen.se/ |
1889x |
|
WormWarner is a tool designed to warn hosts that are probably infected by worms.
|
|
|
| ISIC |
http://packages.debian.org/[..]/net/isic.htm |
1889x |
|
ISIC (and components) is intended to test the integrity of an IP Stack and its component stacks (TCP, UDP, ICMP et. al.) It does this by generating controlled random packets. You can use ISIC for testing if a firewall leaks packets, or how well an IDS functions.
|
|
|
| DX-PKI |
http://www.idealx.org/prj/ |
1888x |
|
IDX-PKI is an Open Source implementation of a Public Key Infrastructure which aims to be IETF compliant for PKIX recommendations. IDX-PKI is routinely used by companies and public agencies.
|
|
|
| NuFW |
http://www.nufw.org/[..].php3?lang=en |
1887x |
|
NuFW is an enterprise grade firewall that performs an authentication of every single connection passing through the IP filter, by transparently requesting user’s credentials before any filtering decision is taken.
|
|
|
| pam_ccreds |
http://www.padl.com/[..]m_ccreds.html |
1887x |
|
The pam_ccreds module provides the means for Linux workstations to locally authenticate using an enterprise identity when the network is unavailable.
|
|
|