Ports Search

Results 3,6013,610 of 5,824 for /net/.(0.004 seconds)
Framework for an intelligence driven security - Script Nugget Ruby
Razorback is a framework for an intelligence driven security solution. It consists of a Dispatcher at the core of the system, surrounded by Nuggets of varying types.
security/snortsam-2.70 (Score: 0.01987111)
SnortSam is a output plugin for Snort
SnortSam is an intelligent agent that allows the popular open-source Intrusion Detection System called Snort to block intruding connections by reconfiguration of many firewalls and Cisco devices.
security/sqlninja-0.2.6 (Score: 0.01987111)
Sql Server exploit toolkit
Sqlninja is a tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end. Its main goal is to provide a remote shell on the vulnerable DB server, even in a very hostile environment. It should be used by penetration testers to help and automate the process of taking over a DB Server when a SQL Injection vulnerability has been discovered.
security/steghide-0.5.1 (Score: 0.01987111)
Steganography tool to hide data in binary files
Steghide is a steganography tool which is able to hide data in "container files" and to extract this data again. If you do not know what steganography is take a look at Neil F. Johnson's paper about steganography at http://www.jjtc.com/Steganography/ Steghide is designed to be portable and configurable and features hiding data in bmp, wav and au files, blowfish encryption, MD5 hashing of passphrases to blowfish keys and pseudo-random distribution of hidden bits ("stego bits") in the container data.
security/stoken-0.6 (Score: 0.01987111)
Software Token for UNIX compatible with RSA SecurID
Stoken is an open source tokencode generator compatible with RSA SecurID 128-bit (AES) tokens. It is a hobbyist project, not affiliated with or endorsed by RSA Security.
security/swatch-3.2.3 (Score: 0.01987111)
The Simple WATCHer and filter
SWATCH - The Simple WATCHer and filter Swatch is designed to monitor system activity. Swatch requires a configuration file which contains pattern(s) to look for and action(s) to do when each pattern is found.
security/tpm-tools-1.3.8 (Score: 0.01987111)
Provides a basic set of TPM tools
tpm-tools package provides a basic TPM management suite.
security/unssh-1.5 (Score: 0.01987111)
Fast way to delete entries from OpenSSH known_hosts file
Provide a fast way to delete entries from OpenSSH's known_hosts file. This is a simple automation of the things normally done by the user when having an "offending key" in his/her known_hosts file caused by a changing host key of the destination.
security/vinetto-0.07 (Score: 0.01987111)
Forensics tool to examine Thumbs.db files
Vinetto extracts the thumbnails and associated metadata from the Thumbs.db files. The Windows systems (98, ME, 2000, XP and 2003 Server) can store thumbnails and metadata of the picture files contained in the directories of its FAT32 or NTFS filesystems. The thumbnails and associated metadata are stored in Thumbs.db files. The Thumbs.db files are undocumented OLE structured files. Once a picture file has been deleted from the filesystem, the related thumbnail and associated metada remain stored in the Thumbs.db file. So, the data contained in those Thumbs.db files are an helpful source of information for the forensics investigator.
security/wapiti-2.3.0 (Score: 0.01987111)
Wapiti is a vulnerability scanner for web applications
Wapiti allows you to audit the security of your web applications. It performs "black-box" scans, i.e. it does not study the source code of the application but will scans the webpages of the deployed webapp, looking for scripts and forms where it can inject data. Once it gets this list, Wapiti acts like a fuzzer, injecting payloads to see if a script is vulnerable.