iStumbler is a small Mac OS/X utility for finding 802.11b & 802.11g wireless networks and services which combines a compact Aqua user interface with advanced wireless scanning and reporting. Changelog available here.
9717b5735caccd871ac7f83ed12f297276254c0067212d563fc91a0098b45d16
RenAttach is an e-mail filter/processor which runs from a user's .forward file. It is designed to protect end users (particularly those using Windows) from malicious e-mail attachments. It does not scan specifically for viruses, but rather renames e-mail attachments so that they can not be accidentally executed. It handles both UUencoded and MIME-encoded attachments. It can be used from within sendmail, postfix, procmail, or pretty much anywhere else.
1875644598f77e47fd86ef288760ac7a010790ba300a9a7c28bab23166764942
Honeyd is a small daemon that creates virtual honey pot hosts on a network. The hosts can be configured to run arbitrary services, and their TCP personality can be adapted so that they appear to be running certain versions of operating systems. Any type of service on the virtual machine can be simulated according to a simple configuration file. Instead of simulating a service, it is also possible to proxy it to another machine.
752ffaa91edf7b6d3a3a7144524b694b63f6f190d37e45ff22d3581a43dd61fa
Active port forwarder is designed for people without an external IP who want to make some services available on the Internet. afserver is placed on the machine with a publicly accessible address, and afclient is placed on the machine behind a firewall or masquerade. This makes the second machine visible to the Internet. Running afserver does not require root privileges, nor does it use threads or other processes. Uses SSL for secure packet tunneling.
8fdf415f846fb9070d51705ddbad66a9fb1bfc3cdcd17c0f26c97883aadd1750
MIMEDefang is a flexible MIME email scanner designed to protect Windows clients from viruses. Includes the ability to do many other kinds of mail processing, such as replacing parts of messages with URLs. It can alter or delete various parts of a MIME message according to a very flexible configuration file. It can also bounce messages with unacceptable attachments. MIMEDefang works with Sendmail 8.11/8.12's new "Milter" API, which makes it more flexible and efficient than procmail-based approaches.
5fa56ea6d079f6b8aefbd36ef56fb696b7a521de69d8467e63d5ded8624ccfe9
Knetfilter is a KDE frontend to iptables which is used with Linux 2.4 to manage the functionality of netfilter. Knetfilter lets you set up most common firewall configurations, as well as perform more sophisticated management of a complex firewall. It's also possible to use an integrated interface to tcpdump and nmap. Screenshot available here.
ee5848f94c5b222043c92072a298a2ed8cfa9ec2313faae6e771a5c53256aa99
tcptrack is a packet sniffer which passively watches for connections on a specified network interface, tracking their states and listing them in a manner similar to the top command. It displays source and destination addresses and ports, connection state, idle time, and bandwidth usage. Screenshot available here.
978cf9ed3cc1cfe2321cb1be45b0261c60bcc473b1e2b60f24ed6916ac6cf7ea
Firewall Builder consists of object-oriented GUI and set of policy compilers for various firewall platforms. In Firewall Builder, firewall policy is a set of rules, each rule consists of abstract objects which represent real network objects and services (hosts, routers, firewalls, networks, protocols). Firewall Builder helps user maintain database of objects and allows policy editing using simple drag-and-drop operations. Firewall Builder can be used to manage firewalls built on variety of platforms including, but not limited to, Linux running iptables and FreeBSD or Solaris running ipfilter.
e6f4477fc29afca3a53fc0c40fea3b1339c9b157eb9329bd7e077048df65d361
File Integrity Command & Control (FICC) helps system administrators manage multiple Tripwire installations across their network. It maintains MD5 hashes for the three key Tripwire files (the config file, executable, and TW database) for every system it monitors. It retrieves these key files from each system via SCP and compares the computed signature against the signatures in the FICC signature database. If all three signatures match the database, FICC then connects to the host via SSH and runs Tripwire.
7890a4b49fe0b512ba7c714a5221513a2293b4036a20831ad7fb4ad9545baf4f
Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, NNTP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code. Windows binaries available here.
b7e937734dfc93527e05a6daf2a54da538c3d6ab050a2ade35b56ab16cec7791
Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, NNTP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code. Windows binaries available here.
d2a55b089d46d14bc4b456bb1927303492dab6649867c67a005d2c9d1ededfb3
Zlib gzprintf() proof-of-concept buffer overflow exploit.
526b27a79eccef0155d5959f4134946835d3f413dd6d008aa45c728ec96c60bd