what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 177 RSS Feed

Files

ifchk 1.1.1
Posted Apr 30, 2019
Authored by noorg | Site noorg.org

Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.

Changes: Fixed a bug whereby a printf(3) format specifier did not have a corresponding argument (ifchk.c:521).
tags | tool
systems | unix
SHA-256 | d47ce9415527099c24ec20155c09bc95f6b268293fd545bd5c6eb0d8a30e975a
ifchk 1.1.0
Posted Apr 2, 2018
Authored by noorg | Site noorg.org

Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.

Changes: Various updates.
tags | tool
systems | unix
SHA-256 | 94a86b57df925c74b1a5b9955b8844d13c666e34bcd266915a8d7858206c495b
ifchk 1.0.9
Posted Feb 3, 2018
Authored by noorg | Site noorg.org

Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.

Changes: Various updates.
tags | tool
systems | unix
SHA-256 | a12cb641290b2c83f598df89e91ebe5a4fada4b6fd008797fc0be41358edcdd4
ifchk 1.0.8
Posted Sep 19, 2017
Authored by noorg | Site noorg.org

Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.

Changes: Various updates.
tags | tool
systems | unix
SHA-256 | 8e43bd3b37ee5bcdadaedc212ca897b1902bb0455ebf3464fd72deac8526b57e
ifchk 1.0.7
Posted Aug 29, 2017
Authored by noorg | Site noorg.org

Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.

Changes: Various updates.
tags | tool
systems | unix
SHA-256 | e6bc2af368b655d99e34562466fc8067cb348eedc6f6f60975ff2539ebeecb76
ifchk 1.0.6
Posted Dec 29, 2016
Authored by noorg | Site noorg.org

Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.

Changes: Default log directory location has changed. PID file has been relocated.
tags | tool
systems | unix
SHA-256 | 972db3aa0cca5a41e4432bc9c3475cedbf89ac641971474928f4bfb8940ed4bc
ifchk 1.0.5
Posted Aug 21, 2016
Authored by noorg | Site noorg.org

Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.

Changes: ifchk PID file has been relocated.
tags | tool
systems | unix
SHA-256 | 2ad7b74e2094b8b5670f0efbb77231515d92114cd814cc17d2fc90f2f9b2df84
ifchk 1.0.4
Posted Jul 12, 2016
Authored by noorg | Site noorg.org

Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.

Changes: Added systemd service unit support for Red Hat Enterprise Linux 7 and CentOS 7.
tags | tool
systems | unix
SHA-256 | be6233788c5f551bb00d25f07e4c7322da322729d845d3e0614a9822f78f967a
ifchk 1.0.3
Posted May 13, 2016
Authored by noorg | Site noorg.org

Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.

Changes: Reorganization of POSIX timer initialization code via relocation to ptimer.c and ptimer.h translation units.
tags | tool
systems | unix
SHA-256 | efd8383c76a727d0e3dcaf8f9052bac35e63e57cffd4cf95b9c56a94fc3ffe5d
ifchk 1.0.2
Posted Apr 3, 2016
Authored by noorg | Site noorg.org

Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.

Changes: Reorganization of POSIX signal set initialization code via relocation to psig.c and psig.h translation units.
tags | tool
systems | unix
SHA-256 | df3195a268465becabadb8bfa924d3a7c69a0f11e5c70b8be206eef0eb94988c
ifchk 1.0.1
Posted Jan 20, 2015
Authored by noorg | Site noorg.org

Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.

Changes: Various updates.
tags | tool
systems | unix
SHA-256 | 3a46d086bc6d38af96da063d3b38b7f844b4115afb2246133f6ebfabfadecad8
Port Forwarding Daemon 0.29
Posted Apr 10, 2013
Authored by Everton da Silva Marques

portfwd is a small userlevel daemon which forwards incoming TCP connections or UDP packets to remote hosts. Multiple forwarders can be specified in a flexible configuration file. There is support for FTP forwarding and transparent proxy.

Changes: Various updates.
tags | tool, remote, udp, tcp
systems | unix
SHA-256 | a880cf57ae00224c470c387cf2de8abbb53c4d761b4d67be5b0c9e15c3484066
AgentSmith Log Monitor 0.2
Posted Apr 10, 2011
Authored by Rafael Ostertag | Site guengel.ch

agentsmith is a daemon that continuously monitors a log file for break-in attempts by remote hosts. Upon detection of a break-in attempt, it launches a user defined script or application, which can do virtually anything from sending mail messages to whatever else you might think of. The criteria for what is considered a break-in attempt can be configured by means of a regular expression.

Changes: New features are IP address exclusion and exchange of host information between remote agentsmith instances.
tags | remote
systems | unix
SHA-256 | 38f56dbf017f6cb260c4abf55f422fe540e95a4058f589a88f6314183e1d8435
ARP Alert 2.0.11
Posted Jan 13, 2011
Authored by Thierry Fournier | Site perso.numericable.fr

arpalert uses ARP address monitoring to help prevent unauthorized connections on the local network. If an illegal connection is detected, a program or script is launched, which could be used to send an alert message, for example.

Changes: Updated error in man. Minor orthographic correction in doc. Fixed erase of configure when make mrproper is called.
tags | local
systems | unix
SHA-256 | d3166f0de57729902d84a61626794494c4eac80ee58241d07c813809328e62cd
AgentSmith Log Monitor 0.1
Posted Jun 17, 2010
Authored by Rafael Ostertag | Site guengel.ch

agentsmith is a daemon that continuously monitors a log file for break-in attempts by remote hosts. Upon detection of a break-in attempt, it launches a user defined script or application, which can do virtually anything from sending mail messages to whatever else you might think of. The criteria for what is considered a break-in attempt can be configured by means of a regular expression.

tags | remote
systems | unix
SHA-256 | 2fd6257852996ba88a353a3c39ff46e2177ff75fa360a82dd7caeca82c528dc5
iCommander Command And Control 0.3
Posted Jun 17, 2010
Site icommander.isecur1ty.org

iCommander is a free and open source Command and Control Centre that lets you manage multiple servers from one place. The idea of iCommander is to provide an easy and secure solution for system administrators that allows them to control several servers from one place and in the same time.

Changes: Protocol commands data compression added. The installer and iCommander\'s updater have improved. Various other changes and fixes.
systems | unix
SHA-256 | 73f3055a6a1ca8b5e80b3a19e36b165a9642add50ff7c81b5f9d42581cd2fc7e
iCommander Command And Control 0.2
Posted Apr 27, 2010
Site icommander.isecur1ty.org

iCommander is a free and open source Command and Control Centre that lets you manage multiple servers from one place. The idea of iCommander is to provide an easy and secure solution for system administrators that allows them to control several servers from one place and in the same time.

Changes: Configuration files added. Various other improvements.
systems | unix
SHA-256 | ffb48814b899ebddbe5c21e81828536d57266db2d7b5cfa67baa96fa22106201
icommander-0.1.tar.gz
Posted Apr 12, 2010
Site icommander.isecur1ty.org

iCommander is a free and open source Command and Control Centre that lets you manage multiple servers from one place. The idea of iCommander is to provide an easy and secure solution for system administrators that allows them to control several servers from one place and in the same time.

systems | unix
SHA-256 | 7be2331762400f819e69b2e768afe0786443a94e5e9e5393cc503e4a4a9ffa69
SSHd Auto-Banning Script
Posted Aug 10, 2009
Site sshdautoban.coredumb.net

sshdautoban is a script intended to automatically ban, in real time, attackers that are trying to connect on your sshd service without authorization. It blocks connections from an IP address when it issues too many login errors.

Changes: The fifo was removed, and sockets are used instead. The fifo was too slow and many log lines could be missed. The documentation was updated.
systems | unix
SHA-256 | 92c99f11e9285e5115c53e480348cda76acf61d9201ab7ead7b580bd444ea898
Systrace 1.6f
Posted Jan 10, 2009
Authored by Neils Provos | Site citi.umich.edu

Systrace enforces system call policies for applications by constraining the application's access to the system. The policy is generated interactively. Operations not covered by the policy raise an alarm, allowing the user to refine the currently configured policy. After a policy has been sufficiently constructed, further alarms often indicate security problems. Policies can also be generated automatically for sandboxing purposes.

Changes: Prevents a 32-bit program from mapping in 64-bit system calls. Supports 64-bit Linux on ptrace.
tags | tool
systems | unix
SHA-256 | d951979cdd23bed9d30de29a2e032ae5ea938d462ebe194bd5291873a8eff2ae
LockDown-1.0.tar.gz
Posted May 20, 2008
Authored by Rick Collette | Site bayareatechops.org

LockDown is an application that can be run interactively, non-interactively, or really-non-interactively to lock down a server that runs Red Hat, Fedora, CentOS, or similar systems. It sets things like umask and SGID/SUID, creates a simple firewall, and more.

systems | linux, redhat, unix, fedora, centos
SHA-256 | bd5e27abaabd9e9495ec1c3d01878157918ff1542c6486638c4ef3f0e4c916f8
arpalert-2.0.10.tar.gz
Posted Mar 28, 2008
Authored by Thierry Fournier | Site perso.numericable.fr

arpalert uses ARP address monitoring to help prevent unauthorized connections on the local network. If an illegal connection is detected, a program or script is launched, which could be used to send an alert message, for example.

Changes: A bug fix and a new script added.
tags | local
systems | unix
SHA-256 | 81054ee1e1b964a20ad6a3d1093096e50c5a790d7b0a835c31883131199f6dfc
systrace-1.6e.tar.gz
Posted Dec 20, 2007
Authored by Neils Provos | Site citi.umich.edu

Systrace enforces system call policies for applications by constraining the application's access to the system. The policy is generated interactively. Operations not covered by the policy raise an alarm, allowing the user to refine the currently configured policy. After a policy has been sufficiently constructed, further alarms often indicate security problems. Policies can also be generated automatically for sandboxing purposes.

Changes: Minimal fixes.
systems | unix
SHA-256 | 9e78877257749add3df4931f4b5bc202ae2724551e22146d28cc40440144f990
vr-12.0c-tar.gz
Posted Dec 12, 2007
Site visualware.com

VisualRoute is a traceroute tool which displays a map of the path to the destination server by looking up the geographical location of each traceroute hop. The network service provider is identified for each hop, and instant domain and network whois information enable quick problem or abuse reporting.

Changes: Minor bug fixes.
systems | unix
SHA-256 | c9d17a7f67cae41f50d27017851558479b06057e3bdf32ef910fd071cce29ddc
arpalert-2.0.9.tar.gz
Posted Nov 26, 2007
Authored by Thierry Fournier | Site perso.numericable.fr

arpalert uses ARP address monitoring to help prevent unauthorized connections on the local network. If an illegal connection is detected, a program or script is launched, which could be used to send an alert message, for example.

Changes: Some fixes, documentation additions, and API additions.
tags | local
systems | unix
SHA-256 | 1b0fb55cf593acdb19f00154afcd5cb12116602b98982dfac827112c8e26d4b8
Page 1 of 8
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close