RSS 1049 projects tagged "Unix Shell"

Download Website Updated 22 Apr 2014 Clonezilla

Screenshot
Pop 3,534.61
Vit 613.25

Clonezilla is a partition or disk cloning tool similar to Symantec Ghost. It saves and restores only blocks in use on the hard drive if the file system is supported. For unsupported file systems, dd is used instead. It has been used to clone a 5 GB system to 40 clients in about 10 minutes.

Download No website Updated 24 Apr 2014 Lynis

Screenshot
Pop 1,808.43
Vit 383.81

Lynis is an auditing and hardening tool for Unix derivatives like Linux/BSD/Solaris. It scans systems to detect software and security issues. Besides security-related information, it will also scan for general system information, installed packages, and possible configuration mistakes. The software is aimed at assisting automated auditing, software patch management, and vulnerability and malware scanning of Unix-based systems.

No download Website Updated 13 Sep 2013 bash programmable completion

Screenshot
Pop 1,558.53
Vit 50.83

Since v2.04, bash has allowed you to intelligently program and extend its standard completion behavior to achieve complex command lines with just a few keystrokes. Imagine typing ssh [Tab] and being able to complete on hosts from your ~/.ssh/known_hosts files. Or typing man 3 str [Tab] and getting a list of all string handling functions in the UNIX manual. mount system: [Tab] would complete on all exported file-systems from the host called system, while make [Tab] would complete on all targets in Makefile. This project was conceived to produce programmable completion routines for the most common Linux/UNIX commands, reducing the amount of typing sysadmins and programmers need to do on a daily basis.

Download Website Updated 30 May 2013 John the Ripper

Screenshot
Pop 1,504.97
Vit 26.80

John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, lots of other hashes and ciphers are added in the community-enhanced version (-jumbo), and some are added in John the Ripper Pro.

Download Website Updated 12 Apr 2014 DRBL

Screenshot
Pop 1,330.17
Vit 138.68

Diskless Remote Boot in Linux (DRBL) provides a diskless or systemless environment for client machines. It works on Debian, Mandriva, Red Hat, Fedora, and SuSE. Unlike LTSP, it uses distributed hardware resources and makes it possible for clients to fully access local hardware. It also includes Clonezilla, a partitioning and disk cloning utility similar to Symantec Ghost.

    Download Website Updated 01 May 2012 Rootkit Hunter

    Screenshot
    Pop 954.39
    Vit 14.11

    Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, sniffers, and malware. The application consists of the main shell script, a few text-based databases, and optional Perl scripts. It can recognise and run external applications like 'skdet' and 'unhide'. It should run on almost every Unix clone.

    Download Website Updated 21 Feb 2014 MoSSHe

    Screenshot
    Pop 886.63
    Vit 48.03

    MoSShE (MOnitoring in Simple SHell Environment) is a simple, lightweight (both in size and system requirements) server monitoring package designed for secure and in-depth monitoring of a handful of typical/critical Internet systems. It supports email alerts and SLA monitoring out of the box, and whatever you can script. The system is programmed in plain (Bourne) SH, and made to be compatible with BASH and Busybox so it can easily be deployed on embedded systems. Monitoring is designed to be distributed over multiple systems, usually running locally. As no parameters are accepted from the outside, checks cannot be tampered or misused from outside. The system is designed to allow decentralized checks and evaluation as well as classical agent-based checks with centralized data accumulation. Agent data is transferred via HTTP, so available Web servers can be co-used for agent data transfer. Each agent creates simple (static) HTML pages with full and condensed status reports on each system, allowing simple local checks.

    Download Website Updated 05 Feb 2014 fwsnort

    Screenshot
    Pop 724.67
    Vit 35.91

    fwsnort translates snort rules into an equivalent iptables ruleset. By making use of the iptables string match module, fwsnort can detect application layer signatures which exist in many snort rules. fwsnort adds a --hex-string option to iptables, which allows snort rules that contain hex characters to be input directly into iptables rulesets without modification. In addition, fwsnort makes use of the IPTables::Parse Perl module in order to (optionally) restrict the snort rule translation to only those rules that specify traffic that could potentially be allowed through an existing iptables policy.

    Download Website Updated 16 Mar 2014 LEAF

    Screenshot
    Pop 675.19
    Vit 103.48

    LEAF is a secure, feature-rich, customizable embedded Linux network appliance for use in a variety of network topologies. Although it can be used in other ways, it's primarily used as a Internet gateway, router, firewall, and wireless access point.

    Download Website Updated 07 Oct 2004 Apache Toolbox

    Screenshot
    Pop 674.83
    Vit 11.09

    Apache Toolbox provides a means to easily compile Apache (IPv4/6) SSL, PHP(v3/v4), MySQL, Jakarta, a large number of modules (61 3rd party modules and 36 default Apache modules, static or as DSOs), and GD libraries with PNG+JPEG+Freetype2+zlib support. It is fully customizable and menu-driven. Everything is compiled from source, and wget is used to download any missing modules. It can also check for RPMs that might cause problems and create an RPM with your selections.

    Screenshot

    Project Spotlight

    Grenouille

    An online service for weather data.

    Screenshot

    Project Spotlight

    lnav

    A log file navigator.