kb.pub

Protection - Musharof Chy

Affichage 1 - 7 sur 7 Entreprises

FakeBo

Fakes trojan servers (Back Orifice, NetBus) and logs every attempt from client.

888 vues
25 janv. 2025

Samhain

A tool for file integrity checking that optionally can be used as a client/server application for c...

616 vues
25 janv. 2025

Guarded Memory Move (GMM)

The GMM library can be used to prevent and study buffer overflows exploits

698 vues
25 janv. 2025

Deception Toolkit

Make your system seem to have network security bugs, and log attack attempts.

125 vues
25 janv. 2025

TCP Wrappers and other security tools

Security tools and papers. A website by Wietse Venema.

861 vues
25 janv. 2025

Flawfinder

Examines source code looking for security weaknesses.

347 vues
25 janv. 2025

Cyber Security and Information Infrastructure Protection

Practical measures for critical infrastructure protection, intrusion prevention and threat assessme...

395 vues
25 janv. 2025