(Page 1 of 3) 1 2 3 Next > Category: System Security Management » Console PBNJ Added 2006-01-18 PBNJ is a network tool that can be used to give an overview of a machine or multiple machines which includes the details about the services running on them. PBNJ is different from other tools because it is based on using a scan from nmap parsed to amap. PBNJ parses the data from a scan and outputs to a CSV format file for each ip address scanned. Travesty Added 2005-03-07 Travesty is an interactive program for managing the hardware addresses (MAC) of ethernet devices on your computer. It supports manually changing the MAC, generating random addresses, and applying different vendor prefixes to the current address. It also allows the user to import their own lists of hardware addresses and descriptions that can be navigated from within the Travesty interface. Travesty is written in Python, and is very simple to add functionality to, or modify. Sherpa Added 2004-11-30 Sherpa is a tool for configuring and then checking system security via the console. Written in perl, it allows an admin to maintain a custom database of file and directory permissions and ownership attributes as local needs dictate. Any changes from the prescribed layout will be detected each time Sherpa is run. Also, Sherpa does some basic system checks (world-writable files, .rhosts and hosts.equiv files, etc.) that help the busy admin keep on top of a system. Honeynet Security Console Added 2004-08-18 Honeynet Security Console is an analysis tool to view events on your personal honeynet. It gives you the power to view events from Snort, TCPDump, Firewall, Syslog and Sebek logs. It also allows you to correlate events from each of these data types to have a full grasp of the attackers' actions. beltane Added 2004-02-13 Beltane is a Web-based central management console for the samhain file integrity system. If samhain is used in a client/server setup, beltane enables the administrator to browse client reports, acknowledge them, and update file signature databases stored centrally on the log server. LogIDS Added 2003-07-08 LogIDS 1.0 is my latest tool and my personal contribution to the IDS field. I think that LogIDS will change the way people view intrusion detection, and may even redefine terms like ?event correlation?. LogIDS 1.0 is a real-time log-analysis based intrusion detection system, or since it can be fed with logs from other kind of IDS, it can be seen as a mega-IDS. The graphical interface presents you with a representation of your network map, where each node (host or subnet) have its own little console window, where the logs belonging to it can eventually be displayed (depending on your rules). You get to specify the format of the log files you want to monitor, apply rules to these log files using field names you have previously defined, and you configure it to correspond to your environment and that's it! Rules can be displaying the fields you choose in the GUI, emit sounds for warnings or alerts, display icons pertaining to the actions depicted in the logs, or disregard the data if it contains no useful data. You can use LogIDS with LogAgent as a log supplier, and monitor logs from varied sources such as, but not limited to, Event Viewer, ComLog, ADSScan, IntegCheck, LogAgent 4.0 Pro, Snort, personal firewalls, most antivirus products, Apache, and just about any other software that produces ASCII log files (with the notable exception of IIS). Wsh Added 2003-06-03 Wsh, "Web shell" is a remote UNIX/WIN shell, that works via HTTP/HTTPS. The package contains two perl scripts for server and client hosts: the first one is for console usage and the second one runs as CGI script on the target host. Bright Noise Added 2002-11-25 Bright Noise is a terminal wrapper for the text- mode Linux console that adds static to the screen font and continuously modifies the palette. It is intended to render low-quality video, personal, or TEMPEST surveillance less effective. HAP Linux Kernel Patches Added 2002-04-03 HAP-Linux is a collection of security-related patches to the 2.2 kernel, designed to be applied after the Openwall Project patch. Includes various chroot(2) hardening, network stealth and bad-TCP-flag patches, ptrace(2) protections, and additional logging of various suspicious, unusual, or privileged events. Deskman Added 2002-03-27 Simple but powerful security tool to control the Desktop. Features: Hide Start Menu, Trap System keys, Hide desktop icons, Hide the clock, Disable "Right-click", Set password to shortcuts, more. Browse by category |
|
Privacy Statement |