what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 335 RSS Feed

System Logging Files

NIELD (Network Interface Events Logging Daemon) 0.11
Posted Jun 26, 2011
Authored by Tetsumune KISO | Site github.com

Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache(ARP,NDP), IP address(IPv4,IPv6), route, FIB rules.

Changes: Various updates.
tags | tool, kernel, system logging
systems | unix
SHA-256 | 1a31ffbe5471d45959df871f190e82ccba4959094409e76a4dadd46dcf7c47a7
NIELD (Network Interface Events Logging Daemon) 0.10
Posted Jan 29, 2011
Authored by Tetsumune KISO | Site github.com

Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache(ARP,NDP), IP address(IPv4,IPv6), route, FIB rules.

tags | tool, kernel, system logging
systems | linux, unix
SHA-256 | 19f1a743b22f6629272eadb6897a15a139b7173e012663ba24919542e9448e57
Tenshi Log Monitoring Program 0.12
Posted Sep 18, 2010
Authored by Andrea Barisani | Site dev.inversepath.com

Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.

Changes: FIFO read bugfix and opensuse rpm spec, see Changelog.
tags | system logging
systems | unix
SHA-256 | 953bbad01cb03674ab6135b70f707467ccd55dd1b8cb7257f1f49473d7767920
Nux Keylogger 0.0.1
Posted Mar 12, 2010
Authored by Vilmain Nicolas

Nux Keylogger monitors keyboard activity on a Linux system. It's possible to hide and daemonize this process and it supports azerty and qwerty keyboard modes.

tags | system logging
systems | linux, unix
SHA-256 | a6baa91a04795b4917c57c6f36d3021dd697e50e5a7a10f6fe05ddcf42ac00ae
Kernel-Level TTY Key And Screen Logger 2.60
Posted Oct 15, 2009
Authored by Jan Engelhardt | Site ttyrpld.sourceforge.net

ttyrpld is a multi-OS kernel-level tty key and screen logger. Recorded sessions can be followed live or replayed at a later time. Supported platforms are Linux, Solaris, FreeBSD, NetBSD, and OpenBSD.

Changes: Support was added for recent versions of various operating systems, such as Linux 2.6.31, FreeBSD 8, OpenBSD 4.5, and NetBSD 5. Escape codes that would trigger an unwanted terminal response are now filtered. The packet format has also been altered to accommodate packets larger than 64K.
tags | kernel, system logging
systems | linux, netbsd, unix, solaris, freebsd, openbsd
SHA-256 | 54db4eca4d95812750c8966d6a9472e23bf75860bc511adcb0649a0248e5dbe3
Tenshi Log Monitoring Program
Posted Jul 20, 2009
Authored by Andrea Barisani | Site dev.inversepath.com

Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.

Changes: Multiple bug fixes and resolve feature.
tags | system logging
systems | unix
SHA-256 | 68640aa0222c406ac5779aa923ff6eb803a2686f3bc9dbf6c05f30e8f42d668c
Mocha Network Activity Monitor
Posted Jan 9, 2009
Authored by Nurullah Akkaya | Site nakkaya.com

Mocha is a tool that monitors your network activity and keeps a record of IP / MAC address pairings and firewall logs. It will give a warning when it notices any suspicious activity, like any changes in MAC address or any connection attempt to the firewall. Written in Java.

tags | java, system logging
systems | unix
SHA-256 | 8d18156a1211358604da4b057ee625f1f9d8b297903784087dcbe64e21a6955e
ttyrpld-2.52.tar.bz2
Posted Sep 8, 2008
Authored by Jan Engelhardt | Site ttyrpld.sourceforge.net

ttyrpld is a kernel-based TTY shell, screen, and key logger for Linux, FreeBSD/PCBSD, and OpenBSD. It has a real-time log analyzer. It supports any TTY type (vc (console), BSD/Unix98 pty (xterm/SSH), serial, ISDN, USB, etc.).

Changes: Updated kernel components for Linux 2.6.27 and updated userspace code for libHX 1.25.
tags | shell, kernel, system logging
systems | linux, unix, freebsd, bsd, openbsd
SHA-256 | 14e04e2d7007ebd9ace27b8a7e35f9b2c3d15ca8de852bd08ffdc9e101044e6d
ttyrpld-2.51.tar.bz2
Posted May 19, 2008
Authored by Jan Engelhardt | Site ttyrpld.sourceforge.net

ttyrpld is a kernel-based TTY shell, screen, and key logger for Linux, FreeBSD/PCBSD, and OpenBSD. It has a real-time log analyzer. It supports any TTY type (vc (console), BSD/Unix98 pty (xterm/SSH), serial, ISDN, USB, etc.).

Changes: Updated rpldhk and rpldev for Linux 2.6.25, OpenBSD 4.3, FreeBSD 7.0, NetBSD 4.0.
tags | shell, kernel, system logging
systems | linux, unix, freebsd, bsd, openbsd
SHA-256 | 4b9b90de7c1d69a2f4d96746a4d0f23e149a8885e20aee818a08c0b655f21fe4
Tenshi Log Monitoring Program
Posted Mar 14, 2008
Authored by Andrea Barisani | Site dev.inversepath.com

Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.

Changes: Multiple bug fixes and some improvements.
tags | system logging
systems | unix
SHA-256 | b57dd0c23f222c28d017394c57277d1e1077fddcfd6b5930bc0a43b4f082b432
os-sim-0.9.9.tar.gz
Posted Feb 25, 2008
Authored by Dominique Karg, David Gil, Fabio Ospitia Trujillo, Julio Casal, Jesus D. Munoz | Site sourceforge.net

Os-sim attempts to unify network monitoring, security, correlation, and qualification in one single tool. It combines Snort, Acid, MRTG, NTOP, OpenNMS, nmap, nessus, and rrdtool to provide the user with full control over every aspect of networking or security. Supported platform is Linux.

Changes: Various bug fixes and feature enhancements.
tags | system logging
systems | linux, unix
SHA-256 | 793ba9005a51e913afa15313742f95bb30495cb8529b2046a50ee5fe2f2fb60b
ttyrpld-2.50.tar.bz2
Posted Jan 2, 2008
Authored by Jan Engelhardt | Site ttyrpld.sourceforge.net

ttyrpld is a kernel-based TTY shell, screen, and key logger for Linux, FreeBSD/PCBSD, and OpenBSD. It has a real-time log analyzer. It supports any TTY type (vc (console), BSD/Unix98 pty (xterm/SSH), serial, ISDN, USB, etc.).

Changes: Changed the packet format to be compatible between 32-bit and 64-bit. Added rplcvt utility. Explicit blacklists added.
tags | shell, kernel, system logging
systems | linux, unix, freebsd, bsd, openbsd
SHA-256 | 9448dfd204026491d4a5fee13a6207a0bc8ebe407c267ad56062d7faa7f0e498
nuhe-0.06.tar.gz
Posted Dec 18, 2007
Authored by Tuomo Makinen | Site nuhe.sourceforge.net

Nuhe is a rule based log monitoring system which is capable of taking action when rules are matched against log activity. By default, Nuhe runs in the background (as a daemon), but it can also be used in the foreground in a log analyzer mode.

Changes: Multiple bug fixes and improvements.
tags | system logging
systems | unix
SHA-256 | 4dd619a96393bb66c43b3743588638daf04418a0460b5790ce29aa503584ce45
nuhe-0.05.tar.gz
Posted Nov 30, 2007
Authored by Tuomo Makinen | Site nuhe.sourceforge.net

Nuhe is a rule based log monitoring system which is capable of taking action when rules are matched against log activity. By default, Nuhe runs in the background (as a daemon), but it can also be used in the foreground in a log analyzer mode.

Changes: Added multiple sources functionality for actions. Various other fixes and changes.
tags | system logging
systems | unix
SHA-256 | a1a3f6cedcab7b2e7afe0cd241c27c5108afad95f1c04c5fec5ef20734fca44e
honeytrap-1.0.0.tar.gz
Posted Oct 29, 2007
Authored by Tillmann Werner | Site honeytrap.sourceforge.net

Honeytrap is a network security tool written to observe attacks against TCP services. As a low-interactive honeypot, it collects information regarding known or unknown network-based attacks and thus can provide early-warning information. The daemon monitors the network stream for incoming connections and dynamically starts server processes if it detects a request to an unbound port. Honeytrap can also be set up as a meta honeypot that forwards several attacks to other systems or, in mirror mode, redirects a connection back to the initiator. Several plugins are available for automated attack analysis.

Changes: New plugins added, various improvements and bug fixes.
tags | tcp, system logging
systems | unix
SHA-256 | f5650b01913e31cc748087063327b1d4f66cf84cf99cd1679f646e70feb16ef4
Tenshi Log Monitoring Program
Posted Oct 6, 2007
Authored by Andrea Barisani | Site dev.inversepath.com

Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.

Changes: Improved debug messages, fixed buggy multiple tail processes handling.
tags | system logging
systems | unix
SHA-256 | 64e1f51e6dacc0a2d6a8e34bcdc18ef271f69110a1da8921e98c557f4c071dba
Tenshi Log Monitoring Program
Posted Sep 19, 2007
Authored by Andrea Barisani | Site dev.inversepath.com

Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.

Changes: Added tail_multiple option, added csv option for comma separated output to custom parser, merged tailargs and filterargs features in tail, filter ones, added FAQ file, another round of rpm spec fixes + fd leak fix.
tags | system logging
systems | unix
SHA-256 | a18dd7b7c40a4804421efd5666adff226e348c03cdb658e3dd530dff8888065a
ttyrpld-2.19.tar.bz2
Posted Sep 19, 2007
Authored by Jan Engelhardt | Site ttyrpld.sourceforge.net

ttyrpld is a kernel-based TTY shell, screen, and key logger for Linux, FreeBSD/PCBSD, and OpenBSD. It has a real-time log analyzer. It supports any TTY type (vc (console), BSD/Unix98 pty (xterm/SSH), serial, ISDN, USB, etc.).

Changes: The kernel interface has been reduced. Various other tweaks and fixes.
tags | shell, kernel, system logging
systems | linux, unix, freebsd, bsd, openbsd
SHA-256 | affa9667488c2f4b394d05e9046a26f0142d0e168708ec00bb65967c877ab7bd
nuhe-0.04.tar.gz
Posted Aug 29, 2007
Authored by Tuomo Makinen | Site nuhe.sourceforge.net

Nuhe is a rule based log monitoring system which is capable of taking action when rules are matched against log activity. By default, Nuhe runs in the background (as a daemon), but it can also be used in the foreground in a log analyzer mode.

Changes: Multiple fixes and changes.
tags | system logging
systems | unix
SHA-256 | 3d9720b47639bd4a14472212b5e2ab97d57c1f145acd63f6510c329e4952a795
Tenshi Log Monitoring Program
Posted Aug 21, 2007
Authored by Andrea Barisani | Site dev.inversepath.com

Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.

Changes: Fixed some rpm spec issues. Added support for queue escalation.
tags | system logging
systems | unix
SHA-256 | f8cc4600a25fc085cd5e3b9af07afd6c0b4607569dde134226e4dd928228c171
devialog-0.9.0.tgz
Posted Jul 7, 2007
Authored by Jeff Yestrumskas | Site devialog.sourceforge.net

devialog is a behavior/anomaly/signature-based syslog intrusion detection system which can detect new, unknown attacks. It fits comfortably in a heterogeneous Unix/Linux/BSD environment at the core of a central syslog server. devialog can generate its own signatures and can act upon anomalies as configured by the system administrator. In addition, devialog can function as a traditional syslog parsing utility in which known signatures trigger actions.

Changes: See changelog.
tags | system logging
systems | linux, unix, bsd
SHA-256 | 1a50e7511b151577c6cd239e8038f80484be34918c6dd6c17745b36118382ce6
honeytrap-0.7.0.tar.gz
Posted May 22, 2007
Authored by Tillmann Werner | Site honeytrap.sourceforge.net

Honeytrap is a network security tool written to observe attacks against TCP services. As a low-interactive honeypot, it collects information regarding known or unknown network-based attacks and thus can provide early-warning information. The daemon monitors the network stream for incoming connections and dynamically starts server processes if it detects a request to an unbound port. Honeytrap can also be set up as a meta honeypot that forwards several attacks to other systems or, in mirror mode, redirects a connection back to the initiator. Several plugins are available for automated attack analysis.

Changes: Plugins can be prioritized. x86 CPU emulation module for generic shellcode analysis. Various other additions and improvements.
tags | tcp, system logging
systems | unix
SHA-256 | 30c5a5de71a068c6cd236063b57173bb15fa8e0408ee74e0eb080ccf00a41cdc
Tenshi Log Monitoring Program
Posted Mar 20, 2007
Authored by Andrea Barisani | Site dev.inversepath.com

Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.

Changes: fifo option can be specified multiple times, logfile and fifo mode can be simultaneous, added sort_order option, added listen option for syslog server mode, see Changelog for full details.
tags | system logging
systems | unix
SHA-256 | 7c47d86205354a3ef578815482374f7bab3450b2bea08621dcbde639bfda768d
honeytrap-0.6.4.tar.gz
Posted Jan 27, 2007
Authored by Tillmann Werner | Site honeytrap.sourceforge.net

Honeytrap is a network security tool written to observe attacks against TCP services. As a low-interactive honeypot, it collects information regarding known or unknown network-based attacks and thus can provide early-warning information. The daemon monitors the network stream for incoming connections and dynamically starts server processes if it detects a request to an unbound port. Honeytrap can also be set up as a meta honeypot that forwards several attacks to other systems or, in mirror mode, redirects a connection back to the initiator. Several plugins are available for automated attack analysis.

Changes: PoC plugin for locality sensitive hashing, Clean solution for giving packet control back to the kernel when using the ip_queue connection monitor, Fixed a segfault in the bpf filter string assembling routine, Failed mirror connections did not fall back to normal mode sometimes due to wrong return value handling for a non-blocking connect(). Fixed. The dynamic server code was redesigned. UDP support added.
tags | tcp, system logging
systems | unix
SHA-256 | 80a60ac18ba93c286463134386f029d6e79638b38dcf42d91acf268429230586
sh2log-1.0.tgz
Posted Nov 9, 2006
Authored by Christophe Devine

sh2log is a PTY sniffing program that captures all keystrokes and console output of physical and virtual consoles. sh2log works as a userland keylogger and does not require installation of a kernel module. Consequently, it can be run on a wide range of different UNIX platforms: Linux, SunOS, BSD, AIX, etc. The essential method of use here is that it man in the middles standard shells.

tags | shell, kernel, system logging
systems | linux, unix, solaris, bsd, aix
SHA-256 | 7a4b4edaed09e0c53c33139d4007a9ac6c6e51d7d8e1fb1493a40a5bd40fccee
Page 2 of 14
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close