Attacks
Find IPs of crackers and kiddies attempting to break in. Creates iptables rules to block attackers IPs for a specified period of time. It works by using handlers which are created to watch for attacks against a given service, such as ssh, telnet, ftp, etc. The handlers can be enabled or...
Platforms: *nix
License: Freeware | Size: 45.06 KB | Download (95): Daemon Shield Download |
SafeCache is an extension which segments the cache on the basis of the document origin, defending against web-privacy attacks. Segments the cache on the basis of the originating document, defending against web privacy attacks that remote sites can use to determine your browser history at other...
Platforms: *nix
License: Freeware | Size: 13.31 KB | Download (95): SafeCache Download |
Fragroute intercepts, modifies, and rewrites egress traffic destined for a specified host, implementing most of the attacks described in the Secure Networks "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection" paper of January 1998. Fragroute features a simple...
Platforms: *nix
License: Freeware | Size: 84.99 KB | Download (144): Fragroute Download |
Squidefender is a perl script which parses a squid log file in native format for attacks. If it finds an attack is sends a complaint email to the ISP of the attacker. It also has the option to execute an external command to take other actions. This can for example be used to automatically adapt...
Platforms: *nix
License: Freeware | Size: 24.58 KB | Download (94): squidefender Download |
BanFromLog is a shell script that examines your /var/log/auth.log and searches for the IP addresses of login attempts which use non-existent user names. BanFromLog is configured for use with sqlite or MySQL. Well is truth that if you have only an user, you dont need this but, when you have...
Platforms: *nix
License: Freeware | Size: 5.12 KB | Download (97): BanFromLog Download |
DeXSS project provides a SAX2 Parser to help protect against Cross-site scripting (XSS) attacks. DeXSS uses TagSoup to parse potentially malformed input, followed by a SAX2 filter pipeline to remove JavaScript from HTML. You can use the DeXSS parser in place of your existing SAX2 parser, or...
Platforms: *nix
License: Freeware | Size: 21.5 KB | Download (100): DeXSS Download |
Libdejector provides a simple, easy-to-use set of libraries which help Web developers give their database queries a great degree of resistance to SQL injection attacks. libdejector library currently provides Python bindings to protect PostgreSQL 8.0.3 through 8.0.5. Installation: The...
Platforms: *nix
License: Freeware | Size: 798.72 KB | Download (98): libdejector Download |
DenyHosts is a script intended to be run by Linux system administrators to help thwart ssh server attacks. If youve ever looked at your ssh log (/var/log/secure on Redhat, /var/log/auth.log on Mandrake, etc...) you may be alarmed to see how many hackers attempted to gain access to your server....
Platforms: *nix
License: Freeware | Size: 49.15 KB | Download (101): DenyHosts Download |
SCM is a Firefox extension that performs Site Continuity Management validations on websites to help prevent Pharming attacks. Pharming attacks are an advanced form of Phishing where an adversary poisons the data held in the user’s DNS server. SCM is believed to be the first add-on to protect...
Platforms: *nix
License: Freeware | Size: 56.32 KB | Download (86): SCM Download |
scanlogd is a TCP port scan detection tool, originally designed to illustrate various attacks an IDS developer has to deal with, for a Phrack Magazine article (see below). Thus, unlike some of the other port scan detection tools out there, scanlogd is designed to be totally safe to use. This...
Platforms: *nix
License: Freeware | Size: 10.24 KB | Download (106): scanlogs Download |
JPasswords is a password management program with encrypted databases. It allows you to store passwords or passphrases, together with related management data like username, entry title, dates and notes, on encrypted disk files. Access to such a file is protected by a single secret key that you can...
Platforms: *nix
License: Freeware | Size: 522.24 KB | Download (108): JPasswords Download |
Need help avoiding phishing and spoofing attacks? Petname Tool can help you avoid online fraud by clearly distinguishing your online relationships. Using the petname tool, you can save a reminder note about a relationship you have with a secure site. The petname tool will then automatically...
Platforms: *nix
License: Freeware | Size: 5.12 KB | Download (97): Petname Tool Download |
Acronis AntiVirus 2010 protects your family and their computers from phishing attacks, spammers and as many as 10,000 new viruses created every week. Superior antivirus and Web page scanning technologies keep you safe while e-mail scans block annoying spam communications. Acronis AntiVirus 2010...
Platforms: Windows
License: Shareware | Cost: $39.99 USD | Size: 232.97 MB | Download (1822): Acronis Antivirus Download |
Wondershare Office Recovery is free yet comprehensive Office recovery software designed to recover office files and PDF files from office 1997 to office 2007. It supports PC hard drive, external hard drive, USB sticks, and so on. Its free offer expires on April 10, 2010. But registration keycode...
Platforms: Windows
License: Freeware | Size: 2.81 MB | Download (427): Wondershare Office Recovery Download |
RAR Password Recovery Magic is a powerful tool designed to recover lost or forgotten passwords for a RAR/WinRAR archives. RAR Password Recovery Magic supports the customizable brute-force and dictionary-based attacks.
RAR Password Recovery Magic has an easy to use interface. All you need to...
Platforms: Windows
License: Shareware | Cost: $29.99 USD | Size: 1.76 MB | Download (347): RAR Password Recovery Magic Download |
Comodo Business Antivirus enables remote, centralized management of PC security products such as Antivirus, Firewall and Disk Encryption on business workstations. With Comodo Business Antivirus businesses can save up to $30 per endpoint per year with the Power Management feature that allows...
Platforms: Windows
License: Freeware | Size: 18 MB | Download (132): Comodo Endpoint Security Manager Download |
Professional Recover-Center is an easy-to-use yet powerful software utility designed to restore accidentally deleted files and folders. It allows you to recover files that have been deleted from the Recycle Bin, as well as those deleted bypassing the Recycle Bin (e.g. Shift-Delete). It will also...
Platforms: Windows
License: Shareware | Cost: $39.00 USD | Size: 1.47 MB | Download (182): Professional Recover-Center Download |
The perfect solution for protecting your sensitive information from theft or other attacks. The program makes a part of your current hard disk into a secure disk. All private and confidential information stored on this disk will be protected by strong encryption. Unlimited disk size, store over...
Platforms: Windows
License: Commercial | Cost: $49.95 USD | Size: 7.14 MB | Download (467): Digital Secure Disk Download |
OpenVPN Watchdog Functions:
1. To prevent IP leaks thereby safeguarding the exposure of the real IP of the user while connected to the OpenVPN server
Includes an inbuilt IP blocker firewall that blocks inbound/outbound connection to thousands of known malicious IPs with ability to use custom...
Platforms: Windows 8, Windows 7, Windows
License: Shareware | Cost: $10.00 USD | Size: 1.99 MB | Download (1101): OpenVPN Watchdog Download |
As a potent and all-inclusive anti-malware and anti-virus tool, IObit Malware Fighter can detect and crush the latest spyware, adware, ransomware, Trojans, keyloggers, bots, worms, hijackers, viruses, etc. that other antivirus software may overlook. With the upgraded IObit Anti-malware Engine,...
Platforms: Windows
License: Demo | Cost: $0.00 USD | Size: 54.72 MB | Download (2205): IObit Malware Fighter Download |