RSS 10 projects tagged "IDS"

Download Website Updated 04 Apr 2012 Securepoint UTM

Screenshot
Pop 456.76
Vit 15.56

The Securepoint Unified Threat Management (UTM) security solutions provide all important security applications (firewall, VPN gateway, virus scanner, spam filter, Web filter, IDS, etc.) within a corresponding server environment, to ensure smooth updates of all systems and to make the everyday usage of these systems successful and secure for companies. They are available as UTM hardware appliances, as virtual appliances, and as a pure software solution which can be installed on standard computer systems and may be adjusted according to individual requirements. Securepoint is Windows 7-ready and supports IKEv1 and IKEv2.

Download No website Updated 19 Mar 2014 Zentyal

Screenshot
Pop 337.29
Vit 20.27

Zentyal Server aims at offering small and medium businesses (SMBs) a native drop-in replacement for Windows Small Business Server and Microsoft Exchange Server which can be set up in less than 30 minutes and is both easy to use and affordable.

No download No website Updated 22 May 2012 LibHTP

Screenshot
Pop 28.98
Vit 39.48

LibHTP is a security-aware parser for the HTTP protocol and the related bits and pieces. That can mean many things, but the only scenario in which LibHTP has been tested so far is the one when you need to parse a duplex HTTP stream that you have obtained by passively intercepting HTTP traffic. Just feed the raw TCP stream to LibHTP and it will do the rest.

Download Website Updated 09 Apr 2010 TinyIDS

Screenshot
Pop 47.79
Vit 1.00

TinyIDS is a distributed intrusion detection system (IDS) for Unix systems. It is based on the client/server architecture and has been developed with security in mind. The client, tinyids, collects information from the local system by running its collector backends. The collected information may include anything, from file contents to file metadata or even the output of system commands. The client passes all this data through a hashing algorithm and a unique checksum (hash) is calculated. This hash is then sent to one or more TinyIDS servers (tinyidsd), where it is compared with a hash that had previously been stored in the databases of those remote servers for this specific client. A response indicating the result of the hash comparison is finally sent back to the client. Management of the remotely stored hash is possible through the client's command line interface. Communication between the client and the server can be encrypted using RSA public key infrastructure (PKI).

Download No website Updated 27 Apr 2010 NSIA

Screenshot
Pop 39.43
Vit 38.19

NSIA (Network System Integrity Analysis) is a Web application monitoring system that scans sites for potentially unwanted context such as defacements, unauthorized changes, errors, information leaks, profanity, and compliance issues. It operates as an IDS (Intrusion Detection System) for Web sites.

Download Website Updated 25 Mar 2014 Suricata

Screenshot
Pop 922.38
Vit 48.44

Suricata is an Intrusion Detection and Prevention (IDS/IPS) engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support, file extraction capabilities, and many more features. It's capable of loading existing Snort rules and signatures, and supports many frontends through Barnyard2.

Download No website Updated 24 Jan 2012 Hawk IDS/IPS

Screenshot
Pop 22.34
Vit 28.67

Hawk IDS/IPS is a lightweight log analyzer which was designed to be fast and efficient. It scans log files on the fly and bans IPs which make too many password failures. It adds iptables rules to reject the IP addresses. You can define the logfiles. Hawk provides a unique Web interface and flexibility, and supports sshd, dovecot, courier, pure-ftpd, proftpd, cPanel, and DirectAdmin.

Download No website Updated 05 Mar 2012 StopHack

Screenshot
Pop 40.99
Vit 28.00

StopHack is a simple to use and easy to install intrusion prevention system. It is fully adaptable and easily customized to your environment. It is built on top of proven bandwidth arbitration technology so the traffic passing through it won't be slowed down. Every packet is analyzed with regular expression-based behavior anomaly detection, and hackers are blocked immediately. It prevents reflected cross-site scripting, SQL injection, directory traversal, reflected URL redirects, login brute forcing, remote shell execution, and more.

No download Website Updated 06 Jul 2012 redBorder IPS

Screenshot
Pop 26.34
Vit 25.63

redBorder IPS is a high performance intrusion prevention system based on Snort running on top of a clustered pf_ring with specific enhancements. A Web management interface is provided to control a large number of such devices, including snort and device configuration, rule management, SNMP monitoring, user roles, and multi-domain support.

Download No website Updated 26 Mar 2013 ThreadFix

Screenshot
Pop 40.40
Vit 1.05

ThreadFix is a software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static, and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows companies to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. By auto-generating application firewall rules, this tool allows organizations to continue remediation work uninterrupted. ThreadFix empowers managers with vulnerability trending reports that show progress over time, giving them justification for their efforts.

Screenshot

Project Spotlight

ncdc

An NCurses-based Direct Connect client.

Screenshot

Project Spotlight

Amac Keylogger Standard

A key logger.