Wapiti – Web application vulnerability scanner

Wapiti allows you to audit the security of your web applications. It performs “black-box” scans, i.e. it does not study the source code of the application but will scans the webpages of the deployed webapp, looking for scripts and forms where it can inject data. Once it gets this list, Wapiti acts like a fuzzer,… Read More »

WiFi Radar

WiFi Radar is a utility for managing, scanning, and auto-connecting to WiFi profiles. It enables you to scan for available networks and create profiles for your preferred networks. At boot time, running WiFi Radar will automatically scan for an available preferred network and connect to it. You can drag and drop your preferred networks to… Read More »

NatACL – firewall group policy controller

NatACL is a firewall group policy controller for intranets and the Internet. It is made of 3 main programs: a DHCP server, a Web authenticator, and a statistic collector. It forces users to use a DHCP client.

IoDine – IP over DNS

This is a piece of software that lets you tunnel IPv4 data through a DNS server. This can be usable in different situations where internet access is firewalled, but DNS queries are allowed.

sshban

sshban is simple daemon designed to ban SSH-flooders. It´s something like Fail2ban, but much simpler and faster. Instead of scanning system logs, it uses pipe to directly receive data from logger. sshban is written in pure Perl, more information is available inside the script, in perldoc format.

Centron Firewall Iptables GUI Client

The Centron IPTables Firewall Gui is an object oriented, database driven, windows interface to linux IPtables firewall rules. The idea is a free Linux based firewall to people who can´t afford expensive commercial grade firewalls and need to have simplified firewall administration.

Keygloo

This is a public key based authentication model that works by verifying whether the user is in posession of his private key. The user should have Keygloo installed in his system for authenticating himself into any Keygloo enabled web application.

GeSWall

With GeSWall, you can safely surf the web, open e-mail attachments, chat, exchange files etc, regardless of the security threats posed by the internet. GeSWall protects you from intrusions and malicious software by isolating vulnerable applications. Isolation applies an access restriction policy that effectively prevents all kinds of attacks, known and unknown.

PHP Honeypot Project

PHP Honeypot Project is an open source project used to: Fool different kind of web attackers (audit tools, manual hackers), Create real statistics about the first top10 commands used by an intruder, Steal malware (PHP, C, Perl) that attackers wanted to upload, Identify evil behaviours and learn about current web threats.

Acunetix Web Vulnerability Scanner

Hackers are concentrating their efforts on attacking applications in your website: 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Web applications are accessible 24 hours a day, 7 days a week and control sensitive data such as customer details, credit card numbers and proprietary corporate data.