Added: February 21, 2010 | Visits: 1.117
The Linux Security Auditing Tool (LSAT) is a post install security auditor for Linux/Unix. Linux Security Auditing Tool checks many system configurations and local network settings on the system for common security/config errors and for packages that are not needed. It (for now) works under...
Added: August 04, 2008 | Visits: 1.061
The change auditing and reporting is a critical management process to prevent erroneous and unauthorized changes of System Microsoft Center Virtual Machine Manager configuration. The virtual infrastructure is maintained by many administrators and you need to have full control over every change...
Added: June 22, 2013 | Visits: 1.425
Packit is a network auditing tool that allows you to monitor, manipulate, and inject customized IP traffic into your network. This can be valuable for testing firewalls, intrusion detection systems, port scanning, and general TCP/IP auditing.
Added: November 11, 2010 | Visits: 933
DSniff project is a collection of tools for network auditing and penetration testing. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.). arpspoof, dnsspoof, and macof facilitate the interception of...
Added: May 16, 2010 | Visits: 745
OpenXDAS is an open source implementation of the OpenGroups Distributed Auditing System. The XDAS standard was defined in 1998 by an OG working group with representation from several software companies supporting various flavors of Unix and other operating systems. XDAS was never taken beyond...
Added: October 24, 2010 | Visits: 783
Qmail Auditor consists of a email auditing tool. QMail Auditor provides simple a method for auditing emails. It is easy to configure and uses regular expressions as rules. The format of audit file is : Any e-mail (outbound or inbound) have passed at this filter. The valids "field...
Added: July 03, 2010 | Visits: 1.126
OSWA-Assistant is a self-contained, freely downloadable, wireless-auditing toolkit for both IT-security professionals and End-users alike. This toolkit is our contribution to the wireless security/auditing community and, as the "Assistant" moniker implies, and is designed for the following...
Added: June 23, 2010 | Visits: 954
XenMan is an intuitive GUI based Xen management tool covering all phases of the operational lifecycle. XenMan should prove valuable to both Xen administrators and those seeking an introduction to Xen virtualization management. When you start XenMan the first time, it will prompt you with a...
Added: August 12, 2010 | Visits: 1.038
Impost is a network security auditing tool designed to analyze the forensics behind compromised and/or vulnerable daemons. Theres two different kinds of operating modes used by Impost; It can either act as a honey pot and take orders from a Perl script controlling how it responds and communicates...
Released: September 01, 2013
Added: October 08, 2013 | Visits: 708
Netwrix SharePoint Change Reporter is a freeware SharePoint auditing product that automatically detects and reports changes made to SharePoint configuration.
Released: April 01, 2014
Added: April 29, 2014 | Visits: 638
The change auditing and reporting is a critical management process to prevent erroneous and unauthorized changes of the Microsoft System Center Virtual Machine Manager configuration. The virtual infrastructure is usually maintained by many administrators and you need to have full control over...
Platforms: Windows, Windows 7, Windows Server
Added: May 10, 2013 | Visits: 232
Lynis is an auditing tool for Unix (specialists). It scans the system and available software, to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated...
Platforms: Mac, *nix, BSD
Added: May 10, 2013 | Visits: 503
Wellenreiter is a wireless network discovery and auditing tool. Prism2, Lucent, and Cisco based cards are supported. It is one of the easiest to use linux wireless scanning tools available. No card configuration has to be done anymore. The whole look and feel is pretty self-explainatory. It can...
Platforms: Windows, *nix, Perl, BSD Solaris
Added: May 10, 2013 | Visits: 349
Active Agenda is a community developed software application for operational risk management (OpRisk). Active Agenda consists of more than eighty (80) integrated modules which help companies to manage and reduce risk and related costs. Active Agenda is an open source software development project...
Platforms: Windows, Mac, *nix, PHP, BSD Solaris
Added: May 01, 2013 | Visits: 282
Simulation of Absolute-Value Output Circuit is carried out with operational amplifier,diodes and other components available in Simscape 2.1 version. Regardless of the polarity of the input signal, the output of the circuit is always positive going and this is displayed in the scopes.
Added: August 04, 2013 | Visits: 210
Operational Information, information page for non-professional aerodrome.Let you present weather, NOTAM and documentation. Work with "wxsampler" (separate project) which recieve, save and makes WINDREP and METAR based on the Oregon WMR968/918 weather station.
Added: July 27, 2013 | Visits: 258
SpaceMonkey is a Web application auditing tool. It can detect bugs or security flaws without using a knowledge database. It uses fault injection technics ('fuzzing') in order to reveal the flaws (SQL injection, XSS, File inclusion, command execution ).
Added: October 24, 2013 | Visits: 227
PLAC is a business card sized bootable cdrom running linux. It has network auditing, disk recovery, and forensic analysis tools. ISO will be avialable and scripts to roll you own cd.
Added: November 04, 2013 | Visits: 158
sudosh3 is an auditing shell and filter based on sudosh2 (a continuation of sudosh).
Added: July 04, 2013 | Visits: 222
Bcfg2 helps system administrators produce a consistent, reproducible, and verifiable description of their environment, and offers visualization and reporting tools to aid in day-to-day administrative tasks. It is the fifth generation of configuration management tools developed in the Mathematics...