Twenty Year Anniversary
Showing 1 - 6 of 6 RSS Feed

Files

tiger-3.2.1.tar.gz
Posted Oct 17, 2003
Site savannah.gnu.org

The Tiger Scripts are a security tool set designed to perform audits of UNIX systems. It's useful as an security check tool and as a host intrusion detection tool (if configured to run through cron and by sending e-mail reports).

Changes: Tons of changes all available in the changelog here.
tags | tool, scanner
systems | unix
MD5 | 7c4d6dc7c56b3b6f8fa349eca7f8e41d
tiger-3.1.tar.gz
Posted Oct 17, 2002
Site savannah.gnu.org

The Tiger Scripts are security tool designed to perform audits of UNIX systems. It's useful as an security check tool and as a host intrusion detection tool (if configured to run through cron and by sending e-mail reports).

Changes: Fixed some OS specific bugs. New checks have been added also to the current codebase and some others have been improved. Also 'autoconf' is now used to configure/install Tiger. Over 2200 lines (of code and documentation) have been added to the codebase.
tags | tool, scanner
systems | unix
MD5 | f2f3ae65a53a91b8041d3ff10bede1aa
tiger-2.2.3.check_devs.fix.gz
Posted Aug 17, 1999

Check devs fix/patch for Tiger.

tags | tool, scanner
systems | unix
MD5 | fce4a1296c07f3c7a15a953d958d3021
tiger-2.2.3.tar.gz
Posted Aug 17, 1999

Set of scripts that scan a Unix system looking for security problems.

tags | tool, scanner
systems | unix
MD5 | 093b26321817d8797ebd86cd3d3d78ca
tiger-2.2.4.tgz
Posted Aug 17, 1999
Authored by Texas A&M

Latest release of Tiger security auditing scripts.

tags | tool, scanner
systems | unix
MD5 | c0768d491042b4252ae6ae97da80aa27
tiger-2.2.4p1.tar.gz
Posted Jul 19, 1999

"..tiger is a set of scripts that scan a Un*x system looking for security problems, in the same fashion as Dan Farmer's COPS. 'tiger' was originally developed to provide a check of UNIX systems on the A&M campus that want to be accessed from off campus (clearance through the packet filter). As such, we needed something that *anyone* could run if they could figure out how to get it down to their machine."

tags | tool, scanner
systems | unix
MD5 | bbbc85166ad27f3d1f5b707242196ae3
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

Recent News

News RSS Feed
After Indictment, Russian Hackers' Lives Changed Forever, Ex-Ambassador Says
Posted Jul 16, 2018

tags | headline, hacker, government, usa, russia, fraud, cyberwar, spyware
Can Graphical Passwords Keep Us Secure Online?
Posted Jul 16, 2018

tags | headline, data loss, password
Kodak Bitcoin Mining Scam Evaporates
Posted Jul 16, 2018

tags | headline, fraud
Russians Mined Bitcoin To Fund DNC Hack
Posted Jul 16, 2018

tags | headline, hacker, government, usa, russia, cyberwar
Mueller Indicts 12 Russian Intelligence Officers, Including Guccifer 2.0, For Hacking Democrats
Posted Jul 13, 2018

tags | headline, hacker, government, usa, russia, cyberwar, spyware, fbi
Bogus MDM System Used To Hack iPhones In India
Posted Jul 13, 2018

tags | headline, malware, phone, india, fraud, apple
Chrome Adds Ambitious Browser Mitigation For Spectre
Posted Jul 13, 2018

tags | headline, flaw, google, patch, chrome, intel
Cisco Patches High-Severity Bug In VoIP Phones
Posted Jul 13, 2018

tags | headline, flaw, patch, cisco
Ukraine Claims It Blocked VPNFilter Attack At Chemical Plant
Posted Jul 13, 2018

tags | headline, malware, cyberwar, scada
Ticketmaster Breach Part Of Massive Card Skimming Campaign
Posted Jul 12, 2018

tags | headline, hacker, privacy, bank, data loss, fraud
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close