Search: Home Bugtraq Vulnerabilities Mailing Lists Security Jobs Tools
(Page 1 of 3)   1 2 3  Next >

Category: System Security Management » Console

PBNJ
Added 2006-01-18
by Joshua D. Abraham
PBNJ is a network tool that can be used to give an overview of a machine or multiple machines which includes the details about the services running on them. PBNJ is different from other tools because it is based on using a scan from nmap parsed to amap. PBNJ parses the data from a scan and outputs to a CSV format file for each ip address scanned.

Travesty
Added 2005-03-07
by Robert Wesley McGrew
Travesty is an interactive program for managing the hardware addresses (MAC) of ethernet devices on your computer. It supports manually changing the MAC, generating random addresses, and applying different vendor prefixes to the current address. It also allows the user to import their own lists of hardware addresses and descriptions that can be navigated from within the Travesty interface. Travesty is written in Python, and is very simple to add functionality to, or modify.

Sherpa
Added 2004-11-30
by Rick Crelia, rick@nbank.net
Sherpa is a tool for configuring and then checking system security via the console. Written in perl, it allows an admin to maintain a custom database of file and directory permissions and ownership attributes as local needs dictate. Any changes from the prescribed layout will be detected each time Sherpa is run. Also, Sherpa does some basic system checks (world-writable files, .rhosts and hosts.equiv files, etc.) that help the busy admin keep on top of a system.

Honeynet Security Console
Added 2004-08-18
by Activeworx, Inc.
Honeynet Security Console is an analysis tool to view events on your personal honeynet. It gives you the power to view events from Snort, TCPDump, Firewall, Syslog and Sebek logs. It also allows you to correlate events from each of these data types to have a full grasp of the attackers' actions.

beltane
Added 2004-02-13
by rainer
Beltane is a Web-based central management console for the samhain file integrity system. If samhain is used in a client/server setup, beltane enables the administrator to browse client reports, acknowledge them, and update file signature databases stored centrally on the log server.

LogIDS
Added 2003-07-08
by Adam Richard
LogIDS 1.0 is my latest tool and my personal contribution to the IDS field. I think that LogIDS will change the way people view intrusion detection, and may even redefine terms like ?event correlation?. LogIDS 1.0 is a real-time log-analysis based intrusion detection system, or since it can be fed with logs from other kind of IDS, it can be seen as a mega-IDS. The graphical interface presents you with a representation of your network map, where each node (host or subnet) have its own little console window, where the logs belonging to it can eventually be displayed (depending on your rules). You get to specify the format of the log files you want to monitor, apply rules to these log files using field names you have previously defined, and you configure it to correspond to your environment and that's it! Rules can be displaying the fields you choose in the GUI, emit sounds for warnings or alerts, display icons pertaining to the actions depicted in the logs, or disregard the data if it contains no useful data. You can use LogIDS with LogAgent as a log supplier, and monitor logs from varied sources such as, but not limited to, Event Viewer, ComLog, ADSScan, IntegCheck, LogAgent 4.0 Pro, Snort, personal firewalls, most antivirus products, Apache, and just about any other software that produces ASCII log files (with the notable exception of IIS).

Wsh
Added 2003-06-03
by Alex
Wsh, "Web shell" is a remote UNIX/WIN shell, that works via HTTP/HTTPS. The package contains two perl scripts for server and client hosts: the first one is for console usage and the second one runs as CGI script on the target host.

Bright Noise
Added 2002-11-25
by Deekoo L.
Bright Noise is a terminal wrapper for the text- mode Linux console that adds static to the screen font and continuously modifies the palette. It is intended to render low-quality video, personal, or TEMPEST surveillance less effective.

HAP Linux Kernel Patches
Added 2002-04-03
by hlein
HAP-Linux is a collection of security-related patches to the 2.2 kernel, designed to be applied after the Openwall Project patch. Includes various chroot(2) hardening, network stealth and bad-TCP-flag patches, ptrace(2) protections, and additional logging of various suspicious, unusual, or privileged events.

Deskman
Added 2002-03-27
by deskman@anfibia.net
Simple but powerful security tool to control the Desktop. Features: Hide Start Menu, Trap System keys, Hide desktop icons, Hide the clock, Disable "Right-click", Set password to shortcuts, more.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox







 

Privacy Statement
Copyright 2005, SecurityFocus