Exploit the possiblities
Showing 1 - 25 of 174 RSS Feed

Files

ifchk 1.0.8
Posted Sep 19, 2017
Authored by noorg | Site noorg.org

Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.

Changes: Various updates.
tags | tool
systems | unix
MD5 | c1c6efe5e77f8131b9339ba6ff02701e
ifchk 1.0.7
Posted Aug 29, 2017
Authored by noorg | Site noorg.org

Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.

Changes: Various updates.
tags | tool
systems | unix
MD5 | 5a80d94ed0f5a895e8745170175a8a03
ifchk 1.0.6
Posted Dec 29, 2016
Authored by noorg | Site noorg.org

Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.

Changes: Default log directory location has changed. PID file has been relocated.
tags | tool
systems | unix
MD5 | 3f8900050525c6a2d9b0145d74b35f00
ifchk 1.0.5
Posted Aug 21, 2016
Authored by noorg | Site noorg.org

Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.

Changes: ifchk PID file has been relocated.
tags | tool
systems | unix
MD5 | ab4e4bb1cc385b62f78d5aeb453795a1
ifchk 1.0.4
Posted Jul 12, 2016
Authored by noorg | Site noorg.org

Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.

Changes: Added systemd service unit support for Red Hat Enterprise Linux 7 and CentOS 7.
tags | tool
systems | unix
MD5 | 6414f9b910303b38e74608648f709f68
ifchk 1.0.3
Posted May 13, 2016
Authored by noorg | Site noorg.org

Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.

Changes: Reorganization of POSIX timer initialization code via relocation to ptimer.c and ptimer.h translation units.
tags | tool
systems | unix
MD5 | 7497c7a4a8e0a28f28631e6dd83e3960
ifchk 1.0.2
Posted Apr 3, 2016
Authored by noorg | Site noorg.org

Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.

Changes: Reorganization of POSIX signal set initialization code via relocation to psig.c and psig.h translation units.
tags | tool
systems | unix
MD5 | 1857ee18272a9eee4dd3a34bd09356a5
ifchk 1.0.1
Posted Jan 20, 2015
Authored by noorg | Site noorg.org

Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.

Changes: Various updates.
tags | tool
systems | unix
MD5 | 7e26567040b600fbd210b46e26780941
Port Forwarding Daemon 0.29
Posted Apr 10, 2013
Authored by Everton da Silva Marques

portfwd is a small userlevel daemon which forwards incoming TCP connections or UDP packets to remote hosts. Multiple forwarders can be specified in a flexible configuration file. There is support for FTP forwarding and transparent proxy.

Changes: Various updates.
tags | tool, remote, udp, tcp
systems | unix
MD5 | 93161c91e12b0d67ca52dc13708a2f2f
AgentSmith Log Monitor 0.2
Posted Apr 10, 2011
Authored by Rafael Ostertag | Site guengel.ch

agentsmith is a daemon that continuously monitors a log file for break-in attempts by remote hosts. Upon detection of a break-in attempt, it launches a user defined script or application, which can do virtually anything from sending mail messages to whatever else you might think of. The criteria for what is considered a break-in attempt can be configured by means of a regular expression.

Changes: New features are IP address exclusion and exchange of host information between remote agentsmith instances.
tags | remote
systems | unix
MD5 | 32058175d97ba10555e177f2f2de885f
ARP Alert 2.0.11
Posted Jan 13, 2011
Authored by Thierry Fournier | Site perso.numericable.fr

arpalert uses ARP address monitoring to help prevent unauthorized connections on the local network. If an illegal connection is detected, a program or script is launched, which could be used to send an alert message, for example.

Changes: Updated error in man. Minor orthographic correction in doc. Fixed erase of configure when make mrproper is called.
tags | local
systems | unix
MD5 | 4b2b7682b27c7f260716f59ecfa50ecc
AgentSmith Log Monitor 0.1
Posted Jun 17, 2010
Authored by Rafael Ostertag | Site guengel.ch

agentsmith is a daemon that continuously monitors a log file for break-in attempts by remote hosts. Upon detection of a break-in attempt, it launches a user defined script or application, which can do virtually anything from sending mail messages to whatever else you might think of. The criteria for what is considered a break-in attempt can be configured by means of a regular expression.

tags | remote
systems | unix
MD5 | ed3d3ee4a18fc172ffdb785eb00079fa
iCommander Command And Control 0.3
Posted Jun 17, 2010
Site icommander.isecur1ty.org

iCommander is a free and open source Command and Control Centre that lets you manage multiple servers from one place. The idea of iCommander is to provide an easy and secure solution for system administrators that allows them to control several servers from one place and in the same time.

Changes: Protocol commands data compression added. The installer and iCommander\'s updater have improved. Various other changes and fixes.
systems | unix
MD5 | fad9255a19096fc9b83c313bbdc39ef7
iCommander Command And Control 0.2
Posted Apr 27, 2010
Site icommander.isecur1ty.org

iCommander is a free and open source Command and Control Centre that lets you manage multiple servers from one place. The idea of iCommander is to provide an easy and secure solution for system administrators that allows them to control several servers from one place and in the same time.

Changes: Configuration files added. Various other improvements.
systems | unix
MD5 | 5212b37d7ce0d15786d7ac22f5ba6b64
icommander-0.1.tar.gz
Posted Apr 12, 2010
Site icommander.isecur1ty.org

iCommander is a free and open source Command and Control Centre that lets you manage multiple servers from one place. The idea of iCommander is to provide an easy and secure solution for system administrators that allows them to control several servers from one place and in the same time.

systems | unix
MD5 | 1f0e0539279a274a548213488448c068
SSHd Auto-Banning Script
Posted Aug 10, 2009
Site sshdautoban.coredumb.net

sshdautoban is a script intended to automatically ban, in real time, attackers that are trying to connect on your sshd service without authorization. It blocks connections from an IP address when it issues too many login errors.

Changes: The fifo was removed, and sockets are used instead. The fifo was too slow and many log lines could be missed. The documentation was updated.
systems | unix
MD5 | a7fe4c4724af9becb8cd1dbe3d911c2d
Systrace 1.6f
Posted Jan 10, 2009
Authored by Neils Provos | Site citi.umich.edu

Systrace enforces system call policies for applications by constraining the application's access to the system. The policy is generated interactively. Operations not covered by the policy raise an alarm, allowing the user to refine the currently configured policy. After a policy has been sufficiently constructed, further alarms often indicate security problems. Policies can also be generated automatically for sandboxing purposes.

Changes: Prevents a 32-bit program from mapping in 64-bit system calls. Supports 64-bit Linux on ptrace.
tags | tool
systems | unix
MD5 | e6ddb35d7021a4ac7f965e844e252455
LockDown-1.0.tar.gz
Posted May 20, 2008
Authored by Rick Collette | Site bayareatechops.org

LockDown is an application that can be run interactively, non-interactively, or really-non-interactively to lock down a server that runs Red Hat, Fedora, CentOS, or similar systems. It sets things like umask and SGID/SUID, creates a simple firewall, and more.

systems | linux, redhat, unix, fedora, centos
MD5 | bfae47f30a4724398d62237b8546b860
arpalert-2.0.10.tar.gz
Posted Mar 28, 2008
Authored by Thierry Fournier | Site perso.numericable.fr

arpalert uses ARP address monitoring to help prevent unauthorized connections on the local network. If an illegal connection is detected, a program or script is launched, which could be used to send an alert message, for example.

Changes: A bug fix and a new script added.
tags | local
systems | unix
MD5 | 762298e677122c6ab2786ef3d57aa2f1
systrace-1.6e.tar.gz
Posted Dec 20, 2007
Authored by Neils Provos | Site citi.umich.edu

Systrace enforces system call policies for applications by constraining the application's access to the system. The policy is generated interactively. Operations not covered by the policy raise an alarm, allowing the user to refine the currently configured policy. After a policy has been sufficiently constructed, further alarms often indicate security problems. Policies can also be generated automatically for sandboxing purposes.

Changes: Minimal fixes.
systems | unix
MD5 | 4fd65a51c97612822b658dd8eba79833
vr-12.0c-tar.gz
Posted Dec 12, 2007
Site visualware.com

VisualRoute is a traceroute tool which displays a map of the path to the destination server by looking up the geographical location of each traceroute hop. The network service provider is identified for each hop, and instant domain and network whois information enable quick problem or abuse reporting.

Changes: Minor bug fixes.
systems | unix
MD5 | d32258a7c688b89e500a94bebb398eff
arpalert-2.0.9.tar.gz
Posted Nov 26, 2007
Authored by Thierry Fournier | Site perso.numericable.fr

arpalert uses ARP address monitoring to help prevent unauthorized connections on the local network. If an illegal connection is detected, a program or script is launched, which could be used to send an alert message, for example.

Changes: Some fixes, documentation additions, and API additions.
tags | local
systems | unix
MD5 | ea3fb1831258185ad6b2d0e4f60c052f
arpalert-2.0.8.tar.gz
Posted Oct 26, 2007
Authored by Thierry Fournier | Site perso.numericable.fr

arpalert uses ARP address monitoring to help prevent unauthorized connections on the local network. If an illegal connection is detected, a program or script is launched, which could be used to send an alert message, for example.

Changes: Multiple bug fixes.
tags | local
systems | unix
MD5 | 5542c3fe5999d37f48a70e3b741bc369
seccheck-0.7.6.tar.gz
Posted Aug 30, 2007
Authored by Zazzy Bob | Site zazzybob.com

Seccheck is a feature rich, modular, host-level security checker for Solaris 10. Easily expandable with customized modules, Seccheck produces highly detailed reports based around known and published security best-practices and guidelines. It also produces recommendations on how to fix flagged security issues.

systems | unix, solaris
MD5 | 5539a56337aa47934fb2d202e02ec187
arpalert-2.0.7.tar.gz
Posted Aug 8, 2007
Authored by Thierry Fournier | Site perso.numericable.fr

arpalert uses ARP address monitoring to help prevent unauthorized connections on the local network. If an illegal connection is detected, a program or script is launched, which could be used to send an alert message, for example.

Changes: Minor OpenBSD bug fix. Very minor code optimization.
tags | local
systems | unix
MD5 | a9943e1af9a15a1f41bd424d396fc2f3
Page 1 of 7
Back12345Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

Recent News

News RSS Feed
BIND Comes Apart Thanks To Ancient Denial Of Service Vuln
Posted Jan 17, 2018

tags | headline, dns, denial of service, flaw
Another Round Of Click-Fraud Extensions Pulled From Chrome Store
Posted Jan 17, 2018

tags | headline, malware, phone, google
Satori Botnet Successor Targets Ethereum Mining Rigs
Posted Jan 17, 2018

tags | headline, malware, bank, botnet, fraud
Flaw In VR Porn App Leaves 20,000 Names Exposed
Posted Jan 17, 2018

tags | headline, privacy, flaw
After False Hawaii Missile Notice, FCC Launches Investigation
Posted Jan 15, 2018

tags | headline, government, usa, cyberwar
MaMi Malware Targets Mac OS X DNS Settings
Posted Jan 15, 2018

tags | headline, malware, dns, fraud, apple
Meltdown-Spectre Patches Causing Issues With Industrial Companies
Posted Jan 15, 2018

tags | headline, flaw, patch, scada, intel
Oracle Still Silent On Meltdown, But Lists Patches For x86 Servers Among 233 New Fixes
Posted Jan 15, 2018

tags | headline, database, flaw, patch, oracle, intel
House Expands Warrantless Surveillance Against US Citizens
Posted Jan 12, 2018

tags | headline, government, privacy, usa, phone, spyware, nsa
Retpoline Fix Supposedly Solves Performance Hits For Spectre
Posted Jan 12, 2018

tags | headline, flaw, google, patch, intel
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close