what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 447 RSS Feed

Files

poldi-0.4.tar.bz2
Posted Aug 13, 2008
Authored by Moritz Schulte

Poldi is a PAM module that implements authentication through the OpenPGP smart card. It uses the smart card daemon from the GnuPG project for smart card access.

systems | linux
SHA-256 | f080c3ae8317d6c7099499f40c0aedc7e0ea67eebc788aac662824bf1d9cae19
pam_p11-0.1.4.tar.gz
Posted Jul 31, 2008
Site opensc-project.org

Pam_p11 is a pluggable authentication module (PAM) package for using cryptographic tokens such as smart cards and USB crypto tokens for authentication. Pam_p11 is very simple, as it has no config file, no options other than the PKCS#11 module file, and does not know about certificate chains, certificate authorities, revocation lists, or OCSP. There is one module that uses the $HOME/.eid/authorized_certificates file (like the old pam_opensc did) and one module that uses the $HOME/.ssh/authorized_keys file (like ssh does).

Changes: Various fixes. See changelog.
tags | cryptography
systems | linux
SHA-256 | baad7142f703eb31000ef9ff5242364b29cf70a85db4e2eee0fdf871cce38fb8
32or64elf.c
Posted Jun 2, 2008
Authored by WarGame

Simple tool to verify if an ELF binary needs 32-bit or 64-bit architecture.

systems | linux
SHA-256 | 7d813a460ffed1a22f27976531bfa21e90d2e83608e2011d3d91286db1fd484b
ZoneMinder-1.23.3.tar.gz
Posted Apr 30, 2008
Authored by Philip Coombes | Site zoneminder.com

ZoneMinder is a suite of applications intended for use in video camera security applications, including theft prevention and child or family member monitoring. It supports capture, analysis, recording, and monitoring of video data coming from one or more cameras attached to a Linux system. It also features a user-friendly Web interface which allows viewing, archival, review, and deletion of images and movies captured by the cameras. The image analysis system is highly configurable, permitting retention of specific events, while eliminating false positives. ZoneMinder supports both directly connected and network cameras and is built around the definition of a set of individual 'zones' of varying sensitivity and functionality for each camera. This allows the elimination of regions which should be ignored or the definition of areas which will alarm if various thresholds are exceeded in conjunction with other zones. All management, control, and other functions are supported through the Web interface.

Changes: Fixed a number of potential vulnerabilities in remote script execution that could allow an authenticated ZoneMinder user to create and run arbitrary code on your system as the web user. Various other updates made as well.
tags | web
systems | linux
SHA-256 | 76cba999bf602b1d561921cfcbbf7a9eab64370f349a0b389efff75f4b0c3af2
DumpRam.c
Posted Feb 27, 2008
Authored by WarGame

A simple tool for Linux that allows the dumping of all physical memory (RAM).

systems | linux
SHA-256 | 8940b92686ddb42ffeb087be201962d17d9c9304b3048caabf25ba699a58da90
ZoneMinder-1.23.2.tar.gz
Posted Feb 26, 2008
Authored by Philip Coombes | Site zoneminder.com

ZoneMinder is a suite of applications intended for use in video camera security applications, including theft prevention and child or family member monitoring. It supports capture, analysis, recording, and monitoring of video data coming from one or more cameras attached to a Linux system. It also features a user-friendly Web interface which allows viewing, archival, review, and deletion of images and movies captured by the cameras. The image analysis system is highly configurable, permitting retention of specific events, while eliminating false positives. ZoneMinder supports both directly connected and network cameras and is built around the definition of a set of individual 'zones' of varying sensitivity and functionality for each camera. This allows the elimination of regions which should be ignored or the definition of areas which will alarm if various thresholds are exceeded in conjunction with other zones. All management, control, and other functions are supported through the Web interface.

Changes: Mostly bug fixes with some feature additions.
tags | web
systems | linux
SHA-256 | 8d5237e676289a984737ffdd020b38b84edbf38eb7eb0be9c1bbf728f061170e
rsbac-common-1.3.7.tar.bz2
Posted Feb 20, 2008
Site rsbac.org

Rule Set Based Access Control (RSBAC) is an open source security extension for current Linux kernels. It is based on the Generalized Framework for Access Control (GFAC) and provides a flexible system of access control implemented with the help of a kernel patch. All security relevant system calls are extended by security enforcement code. This code calls the central decision component, which in turn calls all active decision modules and generates a combined decision. This decision is then enforced by the system call extensions.

Changes: Fixed secure_delete hanging on ext3, various other additions, improvements, and fixes.
tags | kernel
systems | linux
SHA-256 | 28da1923749eaf3108d05df4d1ff38775a180be2013cc52c4401280566ce11a5
ZoneMinder-1.23.1.tar.gz
Posted Jan 22, 2008
Authored by Philip Coombes | Site zoneminder.com

ZoneMinder is a suite of applications intended for use in video camera security applications, including theft prevention and child or family member monitoring. It supports capture, analysis, recording, and monitoring of video data coming from one or more cameras attached to a Linux system. It also features a user-friendly Web interface which allows viewing, archival, review, and deletion of images and movies captured by the cameras. The image analysis system is highly configurable, permitting retention of specific events, while eliminating false positives. ZoneMinder supports both directly connected and network cameras and is built around the definition of a set of individual 'zones' of varying sensitivity and functionality for each camera. This allows the elimination of regions which should be ignored or the definition of areas which will alarm if various thresholds are exceeded in conjunction with other zones. All management, control, and other functions are supported through the Web interface.

Changes: Mostly bug fixes with a minor feature addition.
tags | web
systems | linux
SHA-256 | 185ca8aa2e809af8ac55f055c7e58b619a0eb37bd463a8693b76f7a40a439bf8
lidstools-2.2.7.2.tar.gz
Posted Dec 13, 2007
Site lids.org

This is the lidstools source package. It contains the source for the lidsconf and lidsadm utilities used to administrate systems enhanced with the Linux Intrusion Detection System kernel patch. These tools are useless without a LIDS enhanced kernel.

Changes: Multiple bug fixes and enhancements.
tags | kernel
systems | linux
SHA-256 | cc3f000869360abe657fb5983386ec6ad2278d6c8c3f26cb4e80cd2a34dd116d
lids-2.2.3rc1-2.6.21.patch
Posted Dec 13, 2007
Site lids.org

The Linux Intrusion Detection System (LIDS) is a patch which enhances the kernel's security by implementing a reference monitor and Mandatory Access Control (MAC). When it is in effect, chosen file access, all system/network administration operations, any capability use, raw device, memory, and I/O access can be made impossible even for root. You can define which programs may access specific files. It uses and extends the system capabilities bounding set to control the whole system and adds some network and filesystem security features to the kernel to enhance the security. You can finely tune the security protections online, hide sensitive processes, receive security alerts through the network, and more.

Changes: Updated for 2.6.21.
tags | kernel, root
systems | linux
SHA-256 | 93b7374c32ad1d4530b04a2aee544e95c23d97e7b0f9febb5481915180233655
Openwall Linux Kernel Patch
Posted Aug 15, 2007
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security hardening features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

tags | overflow, kernel
systems | linux
SHA-256 | 1e8deb3be83198f6102ea2cfa87c324f6fa31399e90dffd2f0e3b56d0ac9ab6f
multiadm-1.0.7.tar.bz2
Posted Aug 14, 2007
Authored by Jan Engelhardt | Site alphagate.hopto.org

The MultiAdmin security framework kernel module provides a means to have multiple root users with unique UIDs. This bypasses collation order problems with NSCD, allows you to have files with unique owners, and allows you to track the quota usage for every real user. It also implements a sub-admin, a partially restricted root user who has full read-only access to most subsystems, but write rights only to a limited subset, for example writing to files or killing processes only of certain users.

Changes: Updated for 2.6.22.
tags | kernel, root
systems | linux
SHA-256 | 0b7cb673570693e214cb38e3b86f8d5fee7796dc97258e403ee5f7b5d57d8739
Openwall Linux Kernel Patch
Posted Aug 9, 2007
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security hardening features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

tags | overflow, kernel
systems | linux
SHA-256 | aab37c053f58b678cec50513fa87f4675f274047294b84257b60d45390ab1d4a
motion-3.2.8.tar.gz
Posted Jul 28, 2007
Authored by Jeroen Vreeken | Site motion.technolust.cx

Motion uses a video4linux device for detecting movement. It makes snapshots of the movement which later will be converted to MPEG movies, making it useful as an observation or security system. It can send out email and SMS messages when detecting motion and includes a web interface.

Changes: Bugfix release.
tags | web
systems | linux
SHA-256 | 8f695660380edf94cdbe7e580a3146bf8c20bcfe3a47643eb9de95e49f691889
rsbac-common-1.3.5.tar.bz2
Posted Jul 20, 2007
Site rsbac.org

Rule Set Based Access Control (RSBAC) is an open source security extension for current Linux kernels. It is based on the Generalized Framework for Access Control (GFAC) and provides a flexible system of access control implemented with the help of a kernel patch. All security relevant system calls are extended by security enforcement code. This code calls the central decision component, which in turn calls all active decision modules and generates a combined decision. This decision is then enforced by the system call extensions.

Changes: Fixed compilation issue, various other tweaks.
tags | kernel
systems | linux
SHA-256 | 63ad2a3ed8540da3a7d675463144595b214d16e64d5a178e61b7d6954c59f535
pam_p11-0.1.3.tar.gz
Posted Jul 18, 2007
Site opensc-project.org

Pam_p11 is a pluggable authentication module (PAM) package for using cryptographic tokens such as smart cards and USB crypto tokens for authentication. Pam_p11 is very simple, as it has no config file, no options other than the PKCS#11 module file, and does not know about certificate chains, certificate authorities, revocation lists, or OCSP. There is one module that uses the $HOME/.eid/authorized_certificates file (like the old pam_opensc did) and one module that uses the $HOME/.ssh/authorized_keys file (like ssh does).

tags | cryptography
systems | linux
SHA-256 | cb5d1d7e79fb3775ddbe85f7023645e26424a18264e1a5e0894734e1fca4e25a
rsbac-common-1.3.4.tar.bz2
Posted Jun 7, 2007
Site rsbac.org

Rule Set Based Access Control (RSBAC) is an open source security extension for current Linux kernels. It is based on the Generalized Framework for Access Control (GFAC) and provides a flexible system of access control implemented with the help of a kernel patch. All security relevant system calls are extended by security enforcement code. This code calls the central decision component, which in turn calls all active decision modules and generates a combined decision. This decision is then enforced by the system call extensions.

Changes: See changelog.
tags | kernel
systems | linux
SHA-256 | 9b8196a0f22153c7a1013cdf750477fa3763792e4d21045d0f68564dabf789cf
pam_usb-0.4.1.tar.gz
Posted May 30, 2007
Authored by Andrea Luzzardi | Site sig11.org

pam_usb is a PAM module that enables authentication using a USB storage device through DSA private/public keys. It can also work with floppy disks, CD-ROMs, or any kind of mountable device.

Changes: Fixed a security issue related to OpenSSH authentication. Fixed the quiet option (now it is really quiet). Support for devices without vendor/model information.
systems | linux
SHA-256 | 1c3efbb41ff6d97db6b9ac18664d36ca3b11689156be76baf0382e09aa94ea04
rsbac-common-1.3.3.tar.bz2
Posted May 15, 2007
Site rsbac.org

Rule Set Based Access Control (RSBAC) is an open source security extension for current Linux kernels. It is based on the Generalized Framework for Access Control (GFAC) and provides a flexible system of access control implemented with the help of a kernel patch. All security relevant system calls are extended by security enforcement code. This code calls the central decision component, which in turn calls all active decision modules and generates a combined decision. This decision is then enforced by the system call extensions.

Changes: Various updates and code fixes.
tags | kernel
systems | linux
SHA-256 | d2f7efe7637cd9363466a80de70b288221b2c67b2aebea5ebadd611b0221bcbb
lomac-v1.1.2.tar.gz
Posted Apr 23, 2007
Authored by Tim Fraser | Site alum.wpi.edu

LOMAC is a dynamically-loadable security module for Free UNIX kernels that uses Low Water-Mark Mandatory Access Control (MAC) to protect the integrity of processes and data from viruses, Trojan horses, malicious remote users, and compromised network server daemons. The LOMAC loadable kernel module can be used to harden Linux systems without any changes to existing kernels, applications, or configuration files. Due to its simplicity, LOMAC itself requires no configuration, regardless of the users and applications present on the system.

Changes: Please see changelog.
tags | remote, kernel, trojan
systems | linux, unix
SHA-256 | 7d9fd8c887cfcaee957b0a74460ed59a171f5ee5a1b22718c47e72a0f4b192a0
pam_usb-0.4.0.tar.gz
Posted Apr 10, 2007
Authored by Andrea Luzzardi | Site sig11.org

pam_usb is a PAM module that enables authentication using a USB storage device through DSA private/public keys. It can also work with floppy disks, CD-ROMs, or any kind of mountable device.

Changes: Completely redesigned amongst other changes.
systems | linux
SHA-256 | 6166aa915c0504e6d982748c3fc2413659ab5fa30d8a106de6127abfd17cd107
psad-2.0.5.tar.gz
Posted Mar 4, 2007
Site cipherdyne.org

Port Scan Attack Detector (psad) is a collection of four lightweight daemons written in Perl and C that are designed to work with Linux firewalling code (iptables and ipchains) to detect port scans. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, TCP flags and corresponding nmap options, email alerting, and automatic blocking of offending IP addresses via dynamic configuration of ipchains/iptables firewall rulesets. In addition, for the 2.4.x kernels psad incorporates many of the TCP, UDP, and ICMP signatures included in Snort to detect highly suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, Xmas) which are easily leveraged against a machine via nmap. Psad also uses packet TTL, IP id, TOS, and TCP window sizes to passively fingerprint the remote operating system from which scans originate. Changelog available here.

Changes: Bug fixes and some cool new features.
tags | remote, kernel, udp, perl, tcp
systems | linux
SHA-256 | ec3dca8cf70f0e310a22325a33557bd2bf197b958d18dce5c3e73f7bd5ab0e25
rsbac-common-1.3.1.tar.bz2
Posted Jan 14, 2007
Site rsbac.org

Rule Set Based Access Control (RSBAC) is an open source security extension for current Linux kernels. It is based on the Generalized Framework for Access Control (GFAC) and provides a flexible system of access control implemented with the help of a kernel patch. All security relevant system calls are extended by security enforcement code. This code calls the central decision component, which in turn calls all active decision modules and generates a combined decision. This decision is then enforced by the system call extensions.

Changes: Various updates and code fixes.
tags | kernel
systems | linux
SHA-256 | 8d82e208844625913e969bfb6469aa1d8855b0b971aec1085f3d8b16c0f0cb77
Openwall Linux Kernel Patch
Posted Dec 28, 2006
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security hardening features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

tags | overflow, kernel
systems | linux
SHA-256 | b4be56eb79666faa7809789c546465cad92188c39217d1b9ee2b6fd5c0cc9cb1
ZoneMinder-1.22.3.tar.gz
Posted Dec 7, 2006
Authored by Philip Coombes | Site zoneminder.com

ZoneMinder is a suite of applications intended for use in video camera security applications, including theft prevention and child or family member monitoring. It supports capture, analysis, recording, and monitoring of video data coming from one or more cameras attached to a Linux system. It also features a user-friendly Web interface which allows viewing, archival, review, and deletion of images and movies captured by the cameras. The image analysis system is highly configurable, permitting retention of specific events, while eliminating false positives. ZoneMinder supports both directly connected and network cameras and is built around the definition of a set of individual 'zones' of varying sensitivity and functionality for each camera. This allows the elimination of regions which should be ignored or the definition of areas which will alarm if various thresholds are exceeded in conjunction with other zones. All management, control, and other functions are supported through the Web interface.

Changes: Mostly bug fixes with a couple of minor feature additions.
tags | web
systems | linux
SHA-256 | 6bee02be8d5e21d3435c17def157a87727330ee6480be3a8fa5b1966cc10a6bc
Page 2 of 18
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Google Patches Critical Chrome Vulnerability
Posted Apr 24, 2024

tags | headline, flaw, google, patch, chrome
Hackers Are Using Developing Countries For Ransomware Practice
Posted Apr 24, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
North Korean Hackers Hijack Antivirus Updates For Malware Delivery
Posted Apr 24, 2024

tags | headline, hacker, government, malware, flaw, cyberwar, military, north korea
CISA Warns Of Windows Print Spooler Flaw After Microsoft Sees Russian Exploitation
Posted Apr 24, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar
US Charges Iranians With Cyber Snooping On Government, Companies
Posted Apr 24, 2024

tags | headline, hacker, government, privacy, usa, cyberwar, spyware, iran
TensorFlow AI Models At Risk Due To Keras API Flaw
Posted Apr 24, 2024

tags | headline, flaw
Authorities Investigate LabHost Users After Phishing Service Shutdown
Posted Apr 23, 2024

tags | headline, cybercrime, fraud, phish
Windows Vulnerability Reported By The NSA Exploited To Install Russian Malware
Posted Apr 23, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar, spyware, nsa
UnitedHealth Admits Breach Could Cover Substantial Proportion Of People In America
Posted Apr 23, 2024

tags | headline, hacker, privacy, data loss
Microsoft DRM Hack Could Allow Movie Downloads From Streaming
Posted Apr 23, 2024

tags | headline, microsoft, flaw, pirate
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close