PScan is a C source code security scanner, which looks for misuse of
libc functions which use varargs and printf-style formatting
operators. In many situations these can cause security vulnerabilities
in the application if it runs with privileges (setugid, or listening
to a network socket, etc).
An example of the kind of situation pscan looks for is the following:
variable = "%s"; /* or malicious user input */
sprintf(buffer, variable); /* BAD! */
The Suricata Engine is an Open Source Next Generation Intrusion Detection and
Prevention Engine developed by the Open Information Security Foundation (OISF).
This engine is not intended to just replace or emulate the existing tools in
the industry, but will bring new ideas and technologies to the field.
OISF is part of and funded by the Department of Homeland Security's Directorate
for Science and Technology HOST program (Homeland Open Security Technology),
by the Navy's Space and Naval Warfare Systems Command (SPAWAR), as well as
through the very generous support of the members of the OISF Consortium.
More information about the Consortium is available, as well as a list of our
current Consortium Members.
Nessus is a security scanner that crawls across a network, looking
for well-known vulnerabilities and common misconfiguration.
It has a unique set of features, including automatic SSL discovery,
services recognition (so it will catch, for instance, a FTP server
running on a port different than 21) and its own scripting language.
The Nessus Security Scanner is released under the GNU General Public
Licence and aims to be easy to use while extremely powerful.
PS: To install the lot in one operation, do nessus-plugins first.
BASE is the Basic Analysis and Security Engine. It is based on the code
from the ACID project. This application provides a PHP-based web front-end
to query and analyze the alerts coming from a Snort IDS system.
BASE is a web interface to perform analysis of intrusions that Snort has
detected on your network. It uses a user authentication and role-base
system, so that you as the security admin can decide what and how much
information each user can see. It also has a simple to use, web-based
setup program for people not comfortable with editing files directly.
SoftHSM is an implementation of a cryptographic store accessible
through a PKCS #11 interface. You can use it to explore PKCS #11
without having a Hardware Security Module. It is being developed
as a part of the OpenDNSSEC project. SoftHSM uses Botan for its
cryptographic operations.
Razorback is a framework for an intelligence driven security solution.
It consists of a Dispatcher at the core of the system, surrounded by
Nuggets of varying types.
This nugget uses inotify to monitor any number of file system paths
and send any changed or created files to the dispatcher for collection.
Razorback is a framework for an intelligence driven security solution.
It consists of a Dispatcher at the core of the system, surrounded by
Nuggets of varying types.
This nugget uses inotify to monitor any number of file system paths
and send any changed or created files to the dispatcher for collection.
Razorback is a framework for an intelligence driven security solution.
It consists of a Dispatcher at the core of the system, surrounded by
Nuggets of varying types.
The OfficeCat nugget provides the ability to examine Microsoft
Office documents to determine the presence of potential exploit
conditions in the file.
Razorback is a framework for an intelligence driven security solution.
It consists of a Dispatcher at the core of the system, surrounded by
Nuggets of varying types.
This nugget is an open-source PDF analyzer that does not require an
external commercial application to function.
Razorback is a framework for an intelligence driven security solution.
It consists of a Dispatcher at the core of the system, surrounded by
Nuggets of varying types.
This nugget checks the VirusTotal API for the MD5 of the submitted file.
If the file is found, the short data of the alert will contain the results
from the JSON response from VirusTotal.