what you don't know can hurt you
Showing 1 - 6 of 6 RSS Feed

Files

tiger-3.2.1.tar.gz
Posted Oct 17, 2003
Site savannah.gnu.org

The Tiger Scripts are a security tool set designed to perform audits of UNIX systems. It's useful as an security check tool and as a host intrusion detection tool (if configured to run through cron and by sending e-mail reports).

Changes: Tons of changes all available in the changelog here.
tags | tool, scanner
systems | unix
MD5 | 7c4d6dc7c56b3b6f8fa349eca7f8e41d
tiger-3.1.tar.gz
Posted Oct 17, 2002
Site savannah.gnu.org

The Tiger Scripts are security tool designed to perform audits of UNIX systems. It's useful as an security check tool and as a host intrusion detection tool (if configured to run through cron and by sending e-mail reports).

Changes: Fixed some OS specific bugs. New checks have been added also to the current codebase and some others have been improved. Also 'autoconf' is now used to configure/install Tiger. Over 2200 lines (of code and documentation) have been added to the codebase.
tags | tool, scanner
systems | unix
MD5 | f2f3ae65a53a91b8041d3ff10bede1aa
tiger-2.2.3.check_devs.fix.gz
Posted Aug 17, 1999

Check devs fix/patch for Tiger.

tags | tool, scanner
systems | unix
MD5 | fce4a1296c07f3c7a15a953d958d3021
tiger-2.2.3.tar.gz
Posted Aug 17, 1999

Set of scripts that scan a Unix system looking for security problems.

tags | tool, scanner
systems | unix
MD5 | 093b26321817d8797ebd86cd3d3d78ca
tiger-2.2.4.tgz
Posted Aug 17, 1999
Authored by Texas A&M

Latest release of Tiger security auditing scripts.

tags | tool, scanner
systems | unix
MD5 | c0768d491042b4252ae6ae97da80aa27
tiger-2.2.4p1.tar.gz
Posted Jul 19, 1999

"..tiger is a set of scripts that scan a Un*x system looking for security problems, in the same fashion as Dan Farmer's COPS. 'tiger' was originally developed to provide a check of UNIX systems on the A&M campus that want to be accessed from off campus (clearance through the packet filter). As such, we needed something that *anyone* could run if they could figure out how to get it down to their machine."

tags | tool, scanner
systems | unix
MD5 | bbbc85166ad27f3d1f5b707242196ae3
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Microsoft Mocks Google For Failed Security Fix Deployment Methodology
Posted Oct 19, 2017

tags | headline, microsoft, flaw, google, chrome
Malicious Mineraft Apps In Google Play Enslave Your Device To A Botnet
Posted Oct 19, 2017

tags | headline, malware, microsoft, phone, botnet, google
OAIC Received 114 Voluntary Data Breach Notifications In Two Years
Posted Oct 19, 2017

tags | headline, hacker, privacy, australia, data loss
US-CERT Predicts Machine Learning To Become Security Risk
Posted Oct 19, 2017

tags | headline, flaw
ATM Malware Available Online For Online $5,000
Posted Oct 18, 2017

tags | headline, malware, bank, cybercrime, fraud
Oracle Swats 252 Bugs In Patch Update
Posted Oct 18, 2017

tags | headline, flaw, patch, oracle
Child Safety Smartwatches Easy To Hack, Watchdog Says
Posted Oct 18, 2017

tags | headline, privacy, flaw
Domino's Pizza Delivers User Details To Spammers
Posted Oct 18, 2017

tags | headline, privacy, email, spam, fraud
Microsoft Never Disclosed 2013 Hack Of Secret Vulnerability Database
Posted Oct 18, 2017

tags | headline, hacker, microsoft, data loss, flaw
Adobe Patches Zero-Day Used To Plant Gov't Spying Software
Posted Oct 17, 2017

tags | headline, hacker, government, usa, flaw, cyberwar, adobe, zero day, nsa
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close