Packet Fence 7.0.0

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort […]

Blue Team Training Toolkit (BT3) 2.2

Blue Team Training Toolkit (BT3) is an attempt to introduce improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. The Blue Team Training Toolkit is written in […]

360-FAAR Firewall Analysis Audit And Repair 0.6.2

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands. Source: 360-FAAR Firewall Analysis Audit And Repair 0.6.2

Wireshark Analyzer 2.2.6

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Source: Wireshark Analyzer 2.2.6

Ansvif 1.7

Ansvif is “A Not So Very Intelligent Fuzzer”. It feeds garbage arguments and data into programs trying to induce a fault. Source: Ansvif 1.7

rldns Man-In-The-Middle Tool

rldns-mitm is a modified version of rldns version 1.1 to support man-in-the-middle attacks. Whatever dns request is received will always return a single ip address, which has been assigned via a command line argument. Source: rldns Man-In-The-Middle Tool

Samhain File Integrity Checker 4.2.1

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, […]