RSS 25 projects tagged "Windows"

Download Website Updated 07 Jul 2005 AutoNOC

Screenshot
Pop 98.79
Vit 2.31

AutoNOC is a high performance, production integrated, peer-to-peer network operations management platform for Windows and Linux. It provides real-time historical analysis, root cause, fault detection, reporting, alerts and alarms, and no-nonsense correlation. It is an interoperable vendor independent solution with built-in support for Microsoft, Cisco, Linux, IBM, and other major technologies. Additionally it offers many novel capabilities, including end user personalization, easy scalability, compressed historical databases, infinite histories, event archiving (it works as a syslog server), and multi-language support.

Download Website Updated 10 Sep 2008 AutoScan

Screenshot
Pop 166.64
Vit 7.17

AutoScan is an application designed to explore and manage your network. Entire subnets can be scanned simultaneously without human intervention. It features OS detection, automatic network discovery, a port scanner, a Nessus client, a Samba share browser, and the ability to save the network state.

Download Website Updated 05 Jan 2004 Big Brother

Screenshot
Pop 245.52
Vit 7.09

Big Brother is a combination of monitoring methods. Unlike SNMP where information is just collected and devices polled, Big Brother is designed in such a way that each local system broadcasts its own information to a central location. Simultaneously, Big Brother also polls all networked systems from a central location. This creates a highly efficient and redundant method for proactive network monitoring.

Download Website Updated 18 Jan 2014 Disk ARchive

Screenshot
Pop 883.62
Vit 49.85

Dar is a shell command that makes backup of a directory tree and files. Its features include splitting archives over several files, DVD, CD, ZIP, or floppies, compression, full or differential backups, strong encryption, proper saving and restoration of hard links, extended attributes, file forks, Door inodes, and sparse files, remote backup using pipes and external commands (such as ssh), and rearrangement of the "slices" of an existing archive. It can run commands between slices, before and after saving some defined files or directories (for a proper database backup, for example), and quickly retrieve individual files from differential and full backups. Several external GUIs exist as alternatives to its CLI interface, like kdar, DarGUI, SaraB, etc.

Download Website Updated 30 Jan 2001 FakeBO

Screenshot
Pop 47.11
Vit 3.04

FakeBO fakes trojan server responses (Back Orifice, NetBus, etc.) and logs every attempt to a logfile, stdout/stderr or syslog. It is able to send fake pings and replies back to the client which is trying to access your system.

Download Website Updated 08 Apr 2013 GNU Shishi

Screenshot
Pop 119.67
Vit 15.93

Shishi is a (still incomplete) implementation of Kerberos 5, which can be used to authenticate users in distributed systems. It contains a library that can be used by application developers, and a command line utility for users. Shishi supports Kerberos authenticated telnet client/server, IMAP client/server (via GSSAPI), SSH client/server (via GSSAPI), rsh/rlogin client, and a PAM module for host security.

Download Website Updated 03 Apr 2002 IPFC

Screenshot
Pop 68.61
Vit 2.26

IPFC is software and a framework to monitor multiple types of agents in a heterogeneous distributed environment. Agents can implement logging of elements as diverse as packet filters (like netfilter, pf, ipfw, IP Filter, checkpoint FW1, etc.), NIDS (Snort, arpwatch, etc.), Web servers, and other general devices (from syslog-servers to embedded devices). It features log collection for different security "agents", dynamic log correlation possibilities, and easy extensibility due to the generic database and XML message formats used.

Download Website Updated 30 May 2013 John the Ripper

Screenshot
Pop 1,496.41
Vit 27.00

John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, lots of other hashes and ciphers are added in the community-enhanced version (-jumbo), and some are added in John the Ripper Pro.

Download Website Updated 17 Sep 2004 Lepton's Crack

Screenshot
Pop 203.29
Vit 2.18

Lepton's Crack is a generic password cracker. It is easily-customizable with a simple plugin system and allows system administrators to review the quality of the passwords being used on their systems. It can perform a dictionary-based (wordlist) attack as well as a brute force (incremental) password scan, including the use of regular expressions. It supports standard MD4 hash, standard MD5 hash, NT MD4/Unicode, Lotus Domino HTTP password (R4), and SHA-1 hash formats. LM (LAN Manager) plus appending and prepending of characters is available in the Development branch (strongly recommended).

Download Website Updated 02 Mar 2006 Logrep

Screenshot
Pop 197.39
Vit 5.97

Logrep is a secure multi-platform tool for the collection, extraction, and presentation of information from various log files. It features HTML reports, multi-dimensional analysis, overview pages, SSH communication, and graphs, and supports 25 popular systems including Snort, Squid, Postfix, Apache, Sendmail, syslog, iptables/ipchains, xferlog, NT event logs, Firewall-1, wtmp, Oracle listener, and Pix.

Screenshot

Project Spotlight

tlve

A tag-length-value parser.

Screenshot

Project Spotlight

MathMod

Mathematical modeling software