Swatch, the Simple Watch Daemon is a program for UNIX system logging, originally written to actively monitor messages as they are written to a log file via the UNIX syslog utility. Swatch was designed to keep system administrators from being overwhelmed by large quantities of log data. It monitors log files and acts to filter out unwanted data and take one or more simple user specified actions based upon patterns in the log. Swatch can monitor information as it is being appended to the log file and alert system administrators immediately to serious system problems as they occur.
3f3225f58781b125ec0025ae69ddac82e9e8a2e0b1b3bb4b116021812053dfd7
This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.
4a0aee685874a64fcc96bd36f2ed4f341709d9191ef730e7b405de32e87241eb
Incident.pl is a small script which, when given syslogs generated by snort or other tools, can generate an incident report for events that appear to be attempted security attacks, gather information on the remote host, and report the attack to the appropriate administrators.
46adf59384df5ca7c2c095ffeccfb3c7e7ad2d0beb49cb9f31f7dd68985ac1bd
IP Sorcery is a TCPIP packet generator which allows you to send TCP, UDP, and ICMP packets with a GTK+ interface.
128427aa2c9f567d35671fdb436ca66aa14301c90b9cee6ca7ac222e41c6eb9d
Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, NNTP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code. Windows binaries available here.
46b40e6c5e18997904ac098eb57f3c539feb3c92fdf18c475e4524a3b97ceb8c
Floppyfw is a router and firewall on one floppy disk. It uses Linux basic firewall capabilities, and has a simple packaging system. It is ideal for masquerading and securing networks on ADSL and cable lines, using static IP, DHCP, and PPPoE. Installation involves editing of only one file on the floppy.
656537f156e158ceb049740eee387415c59f412c978d35ae9e0a1a73a55aa6af
Patch advisory for Sun Microsystems. Please read for details.
fdb48f205b9093efa4f6227ea7def7424f4461b07154dea026d00d83941e9ec3
Hp-ux-bdf.c is a local root buffer overflow exploit for HP-UX's /usr/bin/bdf.
0e8e2833f271db51967945879c37ea8b040d8a327992db7a84525fd4e618c1ce