Quantcast
Channel: Security Tools – Security List Network™
Browsing all 443 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

tgcd – TCP/IP Gender Changer Daemon utility.

tgcd is a simple Unix network utility to extend the accessibility of TCP/IP based network services beyond firewalls. This can also be used by network analysts and security experts for penetration...

View Article


Image may be NSFW.
Clik here to view.

Walls of Fire – Universal firewall configuration generator.

Walls of Fire(wofgen) Universal firewall configuration generator wit easy to use ipfw, iptables, netsh, ipf/pf, ufw, wipfw, etc.. Dependencies: + C++ compiler + C++ STL Eveything but ipf/pf and wipfw...

View Article


Image may be NSFW.
Clik here to view.

Wily Possum – A firewall penetration testing tool suite.

Wily Possum – is a python and bash script for firewall penetration testing tool suite. Most of these tools and tests was a client/server model where the client is internal to the firewall and the...

View Article

Image may be NSFW.
Clik here to view.

arpstraw – arp spoofing detection tool.

arpstraw is an open source [MITM] detection tool that notify user when it detect an ArpSpoof attack. It rests on a config file arpstraw.cfg where you can specify each host you know in your network....

View Article

Image may be NSFW.
Clik here to view.

opensvp v0.5 – Firewall and application layer gateway testing tool.

Opensvp is a security tool implementing “attacks” to be able to test the resistance of firewall to protocol level attack. It implements classic attacks as well as some new kind of attacks against...

View Article


Image may be NSFW.
Clik here to view.

IntelMQ is a solution for IT security teams for collecting and processing...

IntelMQ is a solution for IT security teams (CERTs, CSIRTs, abuse departments,…) for collecting and processing security feeds (such as log files) using a message queuing protocol. It’s a community...

View Article

Image may be NSFW.
Clik here to view.

Stalker – Threat Intel and Incident-Response.

Stalker is an Opensource threat intelligence from Zeus Tracker, Malc0de, Bambenek and Locky tracker will be collected and dumped it on a database. At the same time I’m also going to collect data from...

View Article

Image may be NSFW.
Clik here to view.

snort v2.9.9.0 – a network intrusion detection and prevention system.

CHANGELOG SNORT V2990 2017-02-24: + Talos has added and modified multiple rules in the browser-ie, file-flash, file-other, indicator-obfuscation, indicator-shellcode and server-webapp rule sets to...

View Article


Image may be NSFW.
Clik here to view.

linux-firewall-tool – Linux iptables automation tool.

linux-firewall-tool is managing iptables, ip6tables using ipsets. It is created to simplify the Linux firewall configuration at CERN IT Databases Group. It is intended to help SysAdmins that manage...

View Article


Image may be NSFW.
Clik here to view.

Lynis v2.4.4 – is a system and security auditing tool for Unix/Linux.

Changelog Lynis v2.4.4 (2017-03-01): * Changes: + Fix for upload function to be used from profile + Reduce screen output for mail section, unless –verbose is used + Code cleanups and removed ‘update...

View Article

Image may be NSFW.
Clik here to view.

HijackThis fork 3 – A free utility that finds malware and other threats.

New on version 3 + Detecting several new hijacking methods + Full support of new OS + New and updated supplement tools + Improved interface + More securely HiJackThis Fork 3 is a tool for scanning your...

View Article

Image may be NSFW.
Clik here to view.

squidmagic – analyze a web-based network traffic.

squidmagic is a tool designed to analyze a web-based network traffic to detect central command and control (C&C) servers and Malicious site, using Squid proxy server and Spamhaus. Dependencies: +...

View Article

Image may be NSFW.
Clik here to view.

AnomalyWebApplicationFirewall – an anomaly based web application firewall.

AnomalyWebApplicationFirewall is a script that used to unify access logs. The only prerequisites are that the nessesary parameters are logged and that all of the parameters are surrounded with double...

View Article


Image may be NSFW.
Clik here to view.

Bluewall is a firewall framework designed for offensive and defensive cyber...

Bluewall is a firewall framework designed for offensive and defensive cyber professionals. This framework allows Cybersecurity professionals to quickly setup their environment while staying within...

View Article

Image may be NSFW.
Clik here to view.

Vulnerator – the vulnerability parsing utility.

The Mission Vulnerator has been designed to assist U.S. Department of Defense (DoD) cybersecurity analysts with the daunting task of consolidating vulnerability data from the numerous sources that have...

View Article


Image may be NSFW.
Clik here to view.

Lynis v2.4.5 – is a system and security auditing tool for Unix/Linux.

Changelog Lynis 2.4.5 (2017-03-09): Changes: + Allow host alias to be specified in profile + Code readability enhancements + Solaris support has been improved Tests: – AUTH-9328 – Add missing 0027 and...

View Article

Image may be NSFW.
Clik here to view.

psad – the Port Scan Attack Detector.

The Port Scan Attack Detector psad is a lightweight system daemon written in is designed to work with Linux iptables/ip6tables/firewalld firewalling code to detect suspicious traffic such as port scans...

View Article


Image may be NSFW.
Clik here to view.

simplify – Generic Android Deobfuscator.

Simplify virtually executes an app to understand its behavior and then tries to optimize the code so that it behaves identically but is easier for a human to understand. Each optimization type is...

View Article

Image may be NSFW.
Clik here to view.

shARP – a tool to detect any ARP spoofing/MiTM incident.

shARP is an anti-ARP-spoofing application software and uses active scanning method to detect any ARP-spoofing incidents. Description: ARP spoofing allows an attacker to intercept data frames on a...

View Article

Image may be NSFW.
Clik here to view.

Tabi – BGP Hijacking Detection Tool.

TaBi is a framework that ease the detection of BGP IP prefixes conflicts, and their classification into BGP hijacking events. The term prefix hijacking refers to an event when an AS, called an...

View Article
Browsing all 443 articles
Browse latest View live