-
Fragroute/Fragrouter : A network intrusion detection evasion toolkit Fragrouter is a one-way fragmenting router – IP packets get sent from the attacker to the Fragrouter, which transforms them into a fragmented data stream to forward to the victim. Many network…
-
Nagios
Nagios : An open source host, service and network monitoring program Nagios is a system and network monitoring application. It watches hosts and services that you specify, alerting you when things go bad and when they get better. Some of…
-
Yersinia
Yersinia : A multi-protocol low-level attack tool Yersinia is a low-level protocol attack tool useful for penetration testing. It is capable of many diverse attacks over multiple protocols, such as becoming the root role in the Spanning Tree (Spanning Tree…
-
OpenBSD
OpenBSD : The Proactively Secure Operating System OpenBSD is one of the only operating systems to treat security as their very highest priority. Even higher than usability in some cases. But their enviable security record speaks for itself. They also…
-
SPIKE Proxy
SPIKE Proxy : HTTP Hacking Spike Proxy is an open source HTTP proxy for finding security flaws in web sites. It is part of the Spike Application Testing Suite and supports automated SQL injection detection, web site crawling, login form…
-
chkrootkit
chkrootkit : Locally checks for signs of a rootkit chkrootkit is a flexible, portable tool that can check for many signs of rootkit intrusion on Unix-based systems. Its features include detecting binary modification, utmp/wtmp/lastlog modifications, promiscuous interfaces, and malicious kernel…
-
Fport
Fport : Foundstone’s enhanced netstat Fport reports all open TCP/IP and UDP ports on the machine you run it on and shows what application opened each port. So it can be used to quickly identify unknown open ports and their…