RSS 152 projects tagged "Security"

Download No website Updated 20 Jan 2011 AAFID2

Screenshot
Pop 135.58
Vit 1.00

AAFID (Autonomous Agents for Intrusion Detection) is a distributed monitoring architecture with an orientation towards Intrusion Detection developed at the CERIAS at Purdue University. AAFID2 is a prototype implementation of the architecture that includes several ready-to-work agents, plus development facilities for writing your own.

Download Website Updated 24 Feb 2013 ANNFiD

Screenshot
Pop 41.81
Vit 1.04

ANNFiD is an experimental forensic tool that identifies file types using neural networks. A GUI tool is used to train the network for new file types. It is intended to be used to determine the nature of corrupted files.

Download Website Updated 26 Jul 2001 Adeos Filesystem Security Scanner

Screenshot
Pop 26.27
Vit 68.19

Adeos Filesystem Security Scanner is an automated filesystem security scanner. It recursively walks all mounted filesystems on the local system, and attempts to identify common security concerns, such as SUID, and world-writeable files. The output is available as text or HTML, with either output type formatted in either report or list style. Text is written to stdout and may be redirected to a file, while HTML is written to a file named results.html in the local directory.

Download Website Updated 01 Sep 2003 Automated Password Generator

Screenshot
Pop 311.76
Vit 5.43

Automated Password Generator is a set of tools for random password generation including a standalone password generator, an RFC972 password generation server, and a Perl client for the password generation server. These feature a built-in X9.17 random number generator, and 35 modes of password generation, including pronounceable password generation.

Download Website Updated 16 Oct 2011 Autossh

Screenshot
Pop 161.04
Vit 8.74

Autossh is a program to monitor and automatically reestablish SSH connections. It is similar to rstunnel (Reliable SSH Tunnel), however, it is implemented in C, and is easier to set up and use, especially for connections to multiple hosts. Autossh has been compiled and tested on OpenBSD, Linux, and Solaris, and should run without needing changes on FreeBSD and NetBSD.

No download Website Updated 07 Jul 2013 BSM Pseudonymizer

Screenshot
Pop 28.18
Vit 1.74

BSM Pseudonymizer pseudonymizes records from Solaris BSM audit trail files. Personal data such as user IDs, pathnames, timestamps, etc. is replaced with pseudonyms so that the generated output doesn't reveal private information about the system's users, but still preserves a maximum of integrity and consistency.

Download Website Updated 03 Mar 2013 Botan

Screenshot
Pop 442.28
Vit 42.57

Botan is a crypto library written in C++. It provides a variety of cryptographic algorithms, including common ones such as AES, MD5, SHA, HMAC, RSA, Diffie-Hellman, DSA, and ECDSA, as well as many others that are more obscure or specialized. It also offers SSL/TLS (client and server), X.509v3 certificates and CRLs, and PKCS #10 certificate requests. A message processing system that uses a filter/pipeline metaphor allows for many common cryptographic tasks to be completed with just a few lines of code. Assembly and SIMD optimizations for common CPUs offers speedups for critical algorithms like AES and SHA-1.

No download Website Updated 11 Aug 2005 Burp intruder

Screenshot
Pop 36.66
Vit 1.51

Burp intruder is a tool that facilitates automated attacks against Web-enabled applications. It is highly configurable and can test for common Web application vulnerabilities such as SQL injection, cross-site scripting, buffer overflows, and directory traversal as well as performing brute force attacks against authentication schemes, enumeration, parameter manipulation, trawling for hidden content and functionality, session token sequencing and session hijacking, data mining, concurrency attacks, and application-layer denial-of-service attacks.

Download Website Updated 13 Apr 2004 C-Kermit

Screenshot
Pop 143.87
Vit 2.95

C-Kermit is a combined serial and network communication software package offering a consistent, medium-independent, cross-platform approach to connection establishment, terminal sessions, file transfer, character-set translation, numeric and alphanumeric paging, and automation of communication tasks. Recent versions include FTP and HTTP clients as well as an SSH interface, all of which can be scripted and aware of character-sets. It supports built-in security methods, including Kerberos IV, Kerberos V, SSL/TLS, and SRP, FTP protocol features such as MLSD, and source-code parity with Kermit 95 2.1 for Windows and OS/2.

No download Website Updated 05 Jul 2003 CCSAT

Screenshot
Pop 39.80
Vit 1.00

CCSAT (Cisco Configuration Security Auditing Tool) is a tool for automated auditing of configuration security for large numbers of Cisco routers and switches. The tool is based upon industry best practices, including Cisco, NSA, and SANS security guides and recommendations. It is flexible and can report details down to individual device interfaces, lines, ACLs, and ASs, etc. This tool has been tested and used successfully on FreeBSD, Solaris 8, and Linux, and should work on all major UNIX platforms (POSIX.2).

Screenshot

Project Spotlight

Mroonga

A fast full-text search engine for MySQL.

Screenshot

Project Spotlight

(R)?ex

A tool to ease the execution of commands on multiple remote servers.