RSS 5 projects tagged "Detection"

No download Website Updated 11 Mar 2011 Guardog

Screenshot
Pop 25.18
Vit 1.02

Guardog is a simple but powerful intrusion dectection system (IDS) that works by inspecting messages from log files, network packets, and other sources. It uses Perl regular expressions to check for any bad messages.

Download No website Updated 03 Oct 2012 HDT

Screenshot
Pop 191.59
Vit 7.13

HDT (Hardware Detection Tool) is an OS independent tool that displays low-level information on any x86 compatible system. It detects ACPI, CPU, PCI devices, DMI (memory, BIOS, motherboard, IPMI base board, chassis, batteries, CPU), disks (geometry, partitions), PXE environment, VESA modes, and VPD. It can also deduce the Linux kernel modules needed by a given host.

No download Website Updated 07 Mar 2012 Hardware Locality

Screenshot
Pop 97.49
Vit 5.97

hwloc provides command line tools and a C API to obtain the hierarchical map of key computing elements, such as: NUMA memory nodes, shared caches, processor sockets, processor cores, and processor "threads". hwloc also gathers various attributes such as cache and memory information, and is portable across a variety of different operating systems and platforms. hwloc primarily aims at helping high-performance computing (HPC) applications, but is also applicable to any project seeking to exploit code and/or data locality on modern computing platforms.

Download No website Updated 11 Jan 2011 graudit

Screenshot
Pop 80.87
Vit 3.35

Graudit is a simple script and signature sets that allows you to find potential security flaws in source code using the GNU utility, grep. It's comparable to other static analysis applications like RATS, SWAAT, and flaw-finder while keeping the technical requirements to a minimum and being very flexible.

Download Website Updated 17 Apr 2009 jsCheck

Screenshot
Pop 24.98
Vit 1.00

jsCheck is a PHP class that lets PHP scripts check if the user has JavaScript activated. This can be done in two different ways. The first is to try to set a cookie with JavaScript, and then to check for that specific cookie with PHP. The other method is to use a form and try to submit that form with JavaScript before the page has loaded, after which PHP can detect whether the $_POST variable was posted back.

Screenshot

Project Spotlight

Linux Test Project

A collection of automated tools for Linux testing.

Screenshot

Project Spotlight

OWASP Zed Attack Proxy

An easy-to-use integrated penetration testing tool for finding vulnerabilities in Web applications.