1971 projects tagged "Security"

Download No website Updated 05 Nov 2001 Firewall-1 Response

Screenshot
Pop 24.98
Vit 67.88

Firewall-1 Response is a Perl script for performing simple active responses based on 'trigger rules' in a Checkpoint Firewall-1. It is good for closing off your network against people who do port scans or network sweeps.

Download Website Updated 29 Nov 2001 GNOME Enigma

Screenshot
Pop 15.26
Vit 67.70

GNOME Enigma (Genigma) emulates an Enigma, a German cryptographic machine used during World War II.

No download Website Updated 01 Dec 2001 SecurityFocus ARIS Extractor

Screenshot
Pop 26.83
Vit 67.69

SecurityFocus ARIS Extractor is a sophisticated Intrusion Detection System (IDS) log analyzer and reporting system, integrated with the SecurityFocus ARIS web site. It allows administrators to upload Intrusion Detection System (IDS) logs to the SecurityFocus ARIS Web site, producing sophisticated reporting, and research attacks and events. By filtering out insignificant or benign data and converting it to a common (XML) format, ARIS extractor streamlines incident reporting for both security professionals and home users, allowing IDS operators to focus only on relevant attacks and incidents. It allows you to analyze and archive logged incidents, cross reference incidents/attacks with the SecurityFocus Vulnerability Database, look up contact information for offending IP addresses, generate personal incident statistics and reports, automatically identify and report important incidents, reduce the amount of time spent parsing IDS logs, and generate daily summary reports, delivered by email (optional). All of this is done without revealing any information that could be used to discern your identity. It can be configured to obfuscate IP addresses, names, and other pertinent details before submitting them to the ARIS Analyzer web site. It supports Snort, Cisco Secure IDS, Dragon, NetProwler, RealSecure, BlackICE Defender, and ICEPac.

Download Website Updated 14 Dec 2001 Come And Go Encryption

Screenshot
Pop 19.44
Vit 67.59

Come And Go Encryption (CAG) is a simple program to encrypt files with a special key. This key is a random garbage file, and it is XOR-ed with the file to render it unusable by normal methods. It uses the principle of the one-time pad, but it is not unbreakable. It can stream the decrypted file to STDOUT for use in pipes (i.e., mplayer movie viewing, xv image viewing, etc.).

Download Website Updated 19 Jan 2002 LogHog

Screenshot
Pop 25.10
Vit 67.32

Loghog was designed to take a proactive stance on snort output. It supports multilog processing and is optimized for high volume traffic. It responds to events by conducting actions such as various forms of email notification and blocking via ipchains, iptables, or ipfw.

No download Website Updated 03 Feb 2002 JHBCI

Screenshot
Pop 12.57
Vit 67.22

JHBCI is JCA/JCE cryptographic service provider for Java. It is useful for building HBCI home banking applications (clients and servers). JHBCI implements all relevant "RDH" crypto algorithms for the German Homebanking Standard HBCI Version 2.2, such as DES, RSA, ISO9796-1:1991-Signature, and RIPEMD160-MessageDigest.

Download Website Updated 15 Feb 2002 Idel

Screenshot
Pop 13.27
Vit 67.12

Idel is a low-level virtual machine designed with simplicity, embedding, and capability security in mind. It comes with a sample application for sharing CPU cycles from your idle computer.

No download Website Updated 21 Feb 2002 Router Audit Tool

Screenshot
Pop 32.51
Vit 67.08

The Router Audit Tool (rat) downloads configurations of router devices running IOS to be audited, and then checks them against the settings defined in the benchmark. For each configuration examined, it produces a report listing the following: a list of each rule checked with a pass/fail score, a raw overall score, a weighted overall score (1-10), and a list of IOS commands that will correct problems identified.

Download Website Updated 26 Feb 2002 SnortKonsole

Screenshot
Pop 77.86
Vit 67.04

SnortKonsole is a Java frontend to the Intrusion Detection System Snort. It supports all configuration aspects of Snort. The configuration, distribution, and activating of sensors is done via scp and SSH.

Download Website Updated 26 Feb 2002 Makejail

Screenshot
Pop 18.57
Vit 67.04

Makejail employs short configuration files to help administrators create and maintain chroot jails. Makejails attempts to guess which files are required by the daemon, and installs all these files into the jail.

Screenshot

Project Spotlight

wcd

Another Norton Change Directory (NCD) clone with more features.

Screenshot

Project Spotlight

pmcyg

A tool for creating customized Cygwin installers.