A framework for information security management. It has the centralized server for managing the IDS sensors, log consolidation and correlation, report generation etc. Also it has customized IDS sensor based on snort.
IPTview is an IPTables emulator, it shows how the user-defined virtual 'packet' traverses the tables and chains and where it gets in the end. This is mainly for educational purposes, but could also be used for testing the configuration of your firewall.
IRC Defender is a modular perl program for protecting your IRC network against virus drones, general troublemakers, ban evasion, and attacks.
This answer to the lack of reaction and the hight resource consuming of network management. It is able to launch and stop various tools distributed on the network depending on user defined rules, security policy and informations send by tools.
Fully packaged linux distribution to provide internet access and resource management to small and medium companies.
Mardot is a script for analize the logs of Iptables and calculate statistics about the package that the system reject. This statistics are use for make graphics, that the users can see whit a web browser. In the future whit the web browser you can use a
A modular, flexible and extensible Identity and Access Management system for integrated login, access and profile management across disparate security domains. Supports Apache, PAM, Webcrossing, XMLRPC and SOAP from C, Perl, and Java with more to come.
OpenAanval - The Open Source version of the Commercial Aanval Console - A full featured advanced Intrusion Detection System (IDS) Console for Snort. Real-time LIVE event monitoring, comprehensive statistics, multi-user, email / audio alerting, IP marking
OpenSST (Open Simple Secure Transaction) is a project to create a simple security protocol for making transaction between (un)trusted parties. The project includes a protocol design specification and a cross-platform software implementation of the speci
Web reverse proxy for Single Sign On (SSO). It can apply a security policy (profiles stored in a LDAP directory) to an existing set of applications, consolidate websites, encrypt all communications, rewrite simple URLs...
PIX Logging Architecture correlates Cisco PIX system logs into a MySQL database and provides a web-based frontend for displaying, searching, and managing Cisco PIX logged events, traffic, and IDS logs (More info at http://www.logging-architecture.net ).
The Password Auditing Project will be a compilation of other, previously released password auditing programs, in such a fashion as to reap the best benefits of each portion. Pulling innovations from John the Ripper, Lepton, Rainbow Tables, and more.
This program runs in terminal. It generates powerful passwords without saving them in your machine.
PatchMonkey is a simple software tool that can be used to easily install any silently installable software on groups of Windows computers. Also provides easy file and registry checking (and action) for groups of Windows computers.
Perl Secure Conf (PSC) is a suid C program which reads a protected configuration file (containing passwords, secret data, whatever) and then drops its privilege. Now, in unpriviledged mode PSC execs a perl script, leaving a handle to the protected conf.
The PureSecure Plugin Factory Project focus on the production and share of Demarc PureSecure Extensible Service Monitoring (ESM) Plugins . They can be wrote in any language you want. Demarc PureSecure is free for non-commercial use.
Regular Expression, Arbitrary Protocol, Opensource Filtering Firewall (Reapoff) is a regular expression enabled TCP/IP plug proxy. The proxy operates on data using a pair of simple rule based configuration files defining the testing and actions on th
SMRadius is a high performance pre-forked radius AAA server, it features a highly configurable backend engine supporting flexible data specifications. Features include traffic and time based capping, topups and account validity periods.
SSH Key Management solution
SSH Access Manager is a comprehensive access security management platform that permits IT professionals to easily establish and maintain an enterprise-wide SSH access security solution from a central location. It enables a team of system administrators to centrally manage and deploy ssh keys. This app is intended to be used in rather large environnements where access to unix accounts are handled with ssh keys. SSH Access Manager allows you to maintain user public keys. You can organise these keys with group of keys called keyring. Then SSH Access Manager will deploy the keys and/or keyrings to specified unix accounts / groups / servers. User can be read from a LDAP directory.
SURFnet IDS, a Distributed Intrusion Detection System (D-IDS). The goal is to provide an early warning system which lets system administrators correlate known and unknown exploits to attacks directed towards their networks.
The SWAP (Secure Wireless Access Point) project is intended for use in embedded appliances. These appliances will operate in the role of a WEP (wireless encryption protocol) and IPSEC enabled wireless access point, IPSEC VPN gateway, and firewall.
SLOP is a PERL and PHP based engine for the collection of and reporting on logs from various network based devices such as firewalls, switches, and web servers. So far, SLOP supports Checkpoint firewalls and Cisco 2900 and 3500 switches.
A privacy and security aware mailing list manager, perfect for allowing closed groups to interact on the Internet without interference from outsiders and former insiders.
SSPE: Simple Security Policy Editor is a simple distributed firewall with an central ascii administration. It uses two plain manually edited ascii-files and some other, static files for each of the target-machines to generate iptables.
Skavenger analyzes HTTP traffic logged by various Web proxies (including WebScarab and Burp) for indications of common web vulnerabilities such as XSS, CRLF injection and various kinds of information disclosure.