Nikto is a Web server scanner which performs comprehensive tests against Web servers for multiple items, including over 3200 potentially dangerous files and CGI scripts, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).
Nipper is a network infrastructure parser. It takes a network infrastructure device configuration file(s), processes it, and produces a report with a security audit, device configuration, and other relevant information. It currently supports Cisco IOS-based routers, Cisco IOS-based switches, Cisco IOS-based catalysts, Cisco NMP-based catalysts, Cisco CatOS-based catalysts, Cisco PIX-based Firewalls, Cisco ASA-based Firewalls, Cisco FWSM-based Firewalls, Cisco Content Service Switches, Juniper ScreenOS-based Firewalls (NetScreen), Nortel Passport devices, CheckPoint Firewall-1 Firewalls, and Sonicwall SonicOS-based Firewalls. Report output is in HTML, LaTeX, XML, and text formats.
Nmap Parser is a Perl module to ease the pain of developing scripts or collecting network information from nmap scans. Nmap::Parser does its task by parsing the information in the output of an nmap scan by using the XML-formatted output. This module can perform an nmap scan and parse the output automagically using parsescan(). It can parse an nmap XML file. This module was developed to speed up network security tool development when using nmap.
Nmap ("Network Mapper") is a utility for network exploration, administration, and security auditing. It uses IP packets in novel ways to determine which hosts are available online (host discovery), which TCP/UDP ports are open (port scanning), and what applications and services are listening on each port (version detection). It can also identify remote host OS and device types via TCP/IP fingerprinting. Nmap offers flexible target and port specifications, decoy/stealth scanning for firewall and IDS evasion, and highly optimized timing algorithms for fast scanning.
NoNox is intended to help automate the defense of Internet servers against attacks such as dictionary login attacks. NoNox monitors log files for user-specified trigger patterns. When a pattern is seen enough times in a given file within a given period of time, NoNox will execute a command. The patterns, time limits, files to watch, and commands are all user-specified. For example, if NoNox sees too many failed login attempts from one IP address, it could execute a command that tells a firewall to drop packets from that host, instantly cutting off the attacker.
NordicEdge Certificate Services gives Web service providers a simple path to integrate x509 certificate authentication, digital signatures, and automatic self-registration with their existing authentication infrastructure. Users can be authenticated by HTTPS client certificates or by a simple WebServices API. The vast majority of x509 certificates are supported, both from major vendors and internal enterprise certificates. Supported signature types are PKCS#7, S/MIME, and XML Digital signatures.
Nova is a software application for preventing and detecting hostile network reconnaissance (such as nmap scans). It does this by first creating the Haystack: a large collection of low interaction honeypots using an updated version of Honeyd. Finding real machines on the network becomes like finding a needle in a haystack of fake machines. Second, Nova uses machine learning algorithms to automatically detect and classify attempts at hostile reconnaissance, so there's no need to go searching manually through your honeypot's log files. It provides an easy to use Web-based interface powered by Node.js to configure itself and Honeyd instances.