RSS 28 projects tagged "Security"

Download Website Updated 23 Dec 2012 Username-Anarchy

Screenshot
Pop 16.46
Vit 21.97

Username-Anarchy is a commandline tool for the generation of usernames based on the users' real names. This is useful for user account/password brute force guessing and username enumeration when usernames are based on the users’ names. By attempting a few weak passwords across a large set of user accounts, user account lockout thresholds can be avoided. Common aliases (or self-chosen usernames) from forums are also included. Features include a plugin architecture, format string-style username formats, and substitutions. When only a first initial and lastname is known (LinkedIn lists users like this), it will attempt all possible first names, common first and last names from various countries (from Familypedia and PublicProfiler), and an exhaustive list of first and lastnames from Facebook. This also includes usernames scraped from forums, ordered by popularity.

No download Website Updated 06 Jul 2012 redBorder IPS

Screenshot
Pop 27.17
Vit 25.53

redBorder IPS is a high performance intrusion prevention system based on Snort running on top of a clustered pf_ring with specific enhancements. A Web management interface is provided to control a large number of such devices, including snort and device configuration, rule management, SNMP monitoring, user roles, and multi-domain support.

Download Website Updated 05 Feb 2012 Whitewash

Screenshot
Pop 13.93
Vit 28.35

The Whitewash module allows Ruby programs to clean up any HTML document or fragment coming from an untrusted source and to remove all dangerous constructs that could be used for cross-site scripting or request forgery. All HTML tags, attribute names and values, and CSS properties are filtered through a whitelist that defines which names and what kinds of values are allowed; everything that doesn’t match the whitelist is removed. The whitelist is provided externally, and the default whitelist is loaded from the whitelist.yaml shipped with Whitewash. The default is the most strict (for example, it does not allow cross-site links to images in IMG tags) and can be considered safe for all uses.

Download Website Updated 18 Jul 2012 URLCrazy

Screenshot
Pop 38.31
Vit 1.22

URLCrazy checks for mistyped domain names of websites. It can detect typo domain squatters and help protect your domain security by identifying domain names to preemptively register. It generates 15 types of typos, including bitflipped domains, knows over 8,000 common misspellings and over 450 homophones, supports multiple keyboard layouts, checks whether a typo is a valid domain, and can test whether domain typos are in use and estimate the popularity of a typo.

Download Website Updated 05 Apr 2011 WhatWeb

Screenshot
Pop 110.80
Vit 3.07

WhatWeb identifies Websites. Its goal is to answer the question, “What is that Website?”. WhatWeb recognizes Web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, Web servers, and embedded devices. WhatWeb has over 900 plugins, each to recognize something different. It also identifies version numbers, email addresses, account IDs, Web framework modules, SQL errors, and more. It can be stealthy and fast, or thorough but slow. It supports an aggression level to control the trade off between speed and reliability.

No download Website Updated 20 Sep 2010 iexploder

Screenshot
Pop 50.69
Vit 1.85

iExploder is like a fire hydrant full of bad HTML and CSS code to test the stability and security of Web browsers. It is available as a standalone Web server or CGI script. It continuously feeds browsers bad data in the hope that they will eventually crash. It is designed to run for hours, or even days until the browser crashes.

Download Website Updated 08 Mar 2010 nessus-xmlrpc

Screenshot
Pop 32.89
Vit 1.42

nessus-xmlrpc is a Ruby library for the Nessus XML-RPC interface. You can use it to start, stop, pause, and resume scans. It lets you watch progress and status of scans, download reports, etc. It comes with an example command line program that shows how easy it is to interact with the Nessus scanner.

No download Website Updated 11 Apr 2014 OpenDNSSEC

Screenshot
Pop 231.44
Vit 62.35

OpenDNSSEC is software that manages the security of domain names on the Internet. The project intends to drive adoption of Domain Name System Security Extensions (DNSSEC) to further enhance Internet security.

Download Website Updated 12 Aug 2009 Unhide.rb

Screenshot
Pop 79.65
Vit 1.00

Unhide.rb finds hidden processes on your system. It looks for active processes in many different ways. Processes found by some means but not others are considered to be "hidden", and are reported to the user. Unhide.rb is a Ruby rewrite of the original Unhide, which was written in C. Unhide.rb performs the same checks as the original, but is 10 times faster in only half as much code, and has better diagnostics when hidden processes are found.

No download Website Updated 03 Mar 2011 RedWolf Security Threat Generator

Screenshot
Pop 139.66
Vit 2.47

RedWolf is a security threat simulator that tests security system effectiveness. Its threat generation capabilities include email, IM, malware, P2P, social networking, VoIP, DDoS, and many more. The guiding philosophy is that by generating realistic scenarios in a wide variety of categories, an auditor or organization can assess the effectiveness of network defenses. The scenario suite allows one to verify compliance with PCI-DSS, Sarbanes-Oxley, or HIPAA controls. RedWolf helps identify data loss risks and provides expert recommendations concerning risk mitigation. It reports present findings, recommendations, best practices, and blocking guidance in a straightforward, easily readable format. RedWolf also acts as a 'Red Team' agent, running drills to measure the readiness of your operations staff.

Screenshot

Project Spotlight

Embedthis Appweb

A fast little Web server for embedding.

Screenshot

Project Spotlight

Samba

Tools to access to a server's filespace and printers via SMB.