Newbies What Next ? News Forums Calendar
Home | Register | News | Forums | Portal Pages | MyLinks | New | Hot | Link Us


 Category Gateway
More Options

LinuxLinks News
 · First hands-on with the Creator CI20 microcomputer
 · Canonical’s Stripped-Down “Snappy” Ubuntu Comes To Google’s Compute Engine
 · KDE Ships KDE Applications 14.12.0
 · Why is the Number of Linux Distros Declining?
 · The new minuscule Linutop XS is announced!
 · Getting Started With KODI(XBMC)
 · PikeOS provides Safety and Security for Energy-Sensible Communication Platform from X-ES
 · SMPlayer with support for MPV is now available
 · USB Armory: Open Source USB Stick Computer
 · Magical Open Source Music Workstations


Latest Links
Kill Me Softly


Top : Software : Networking : Security : Miscellaneous

First hands-on with the Creator CI20 microcomputer
When we introduced Creator CI20 two weeks ago in London, we had several demonstrations on display showing the full capabilities of the board in terms of performance and power consumption.

(Read more)
rxvt is a colour vt102 terminal emulator intended as an xterm(1) replacement for users who do not require features such as Tektronix 4014 emulation and toolkit-style configurability. As a result, rxvt uses much less swap space.


  • The Sleuth Kit
    The Sleuth Kit (TSK) is a library and collection of command line file and volume system forensic analysis tools that allow you to investigate and analyze volume and file system data. Read more hot
  • AirSAM
    AirSAM is a desktop GUI that compliments the Web based Snort Alert Monitor. AirSAM gives up to date insight into who might be attacking your network. The ultimate goal is to give audio/visual cues right at the time of the attack.
  • alph
    alph implements and analyses historical and traditional c(ai)phers providing a pipe interface in order to encrypt and decrypt block text. The program can be conjuncted with pipes reulting in transparent en-decrypt: Atbash, Caesar, Vigenere, Playfair, and Vernam.
  • AntiExploit
    AntiExploit is a on-access exploit scanner to detect local intruders. It scans for over 3900 suspicious files, has daily database updates, and will act if a file is accessed. It uses the dazuko kernel module, which is also used by clamAV, Amavis, and other virus scanners.
  • APS
    Aps is a small tool for analyzing network traffic. It prints out a great deal of information about the relevant protocols including TCP, UDP, ARP, and ICMP. It allows you to filter IP addresses, hardware addresses, ports, and specific protocols. It comes with a little GTK-GUI displaying packet counters for each protocol.
  • ARPSpoofDetector
    ARPSpoofDetector performs active and passive detection of ARP spoofing and IP (IPv4) address collision. The program can send healing packets with regular ARP information.
  • attackwatch
    attackwatch analyzes the firewall-output in near-realtime and will run scripts in response to incoming packets that got logged.
  • authforce
    authforce is an HTTP authentication brute forcer. Using various methods, it attempts brute force username and password pairs for a site. It has the ability to try common username and passwords, username derivations, and common username/password pairs.
  • Automated Image and Restore
    Automated Image and Restore (AIR) is a graphical user interface front-end to dd/dc3dd. This tool is designed to make the task of creating forensic images of digital media easier for investigators and incident response personnel. Read more
  • Bletchley
    Bletchley is a real-world cryptanalysis framework. It was created to assist with the detection, analysis, and exploitation of cryptographic flaws and aims to help automate the tedious aspects of this analysis while leaving the security expert in control of the process.
  • Bluediving
    Bluediving is a Bluetooth pentesting suite. It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack, and features like Bluetooth address spoofing.
  • Bluefog
    Bluefog is an experimental tool designed to create large numbers of phantom Bluetooth devices.
  • BlueProximity
    BlueProximity helps add a little more security to the desktop. It does so by detecting a certain Bluetooth device, most likely a mobile phone, and keeping track of its distance. If it is moved away from the computer and the distance is above a certain level (no measurement in meters is possible) for a given time, it automatically locks the desktop (or starts any other shell command wanted). Once away, the computer awaits its master's return: if the device is nearer than a given level for a set time, the computer unlocks without any interaction (or starts any other shell command wanted).
  • bpf
    bpf is the Berkeley Packet Filter.
  • CaclMgr
    CaclMgr is a security package which enables UNIX users to have control over which user will get which UNIX command or SHELL script to be executed with my privilege.
    CCSAT (Cisco Configuration Security Auditing Tool) is a tool for automated audit of configuration security of large numbers of Cisco routers and switches. The tool is based upon industry best practices, including Cisco, NSA, and SANS security guides and recommendations. It is flexible and can report details down to individual device interfaces, lines, ACLs, and ASs, etc. CCSAT has been tested, and used for real audits, on FreeBSD, Solaris 8 and Linux. It should also work on all other major UNIX platforms (POSIX.2).
  • cgichk
    cgichk is a web vulnerability tool that automatically searches for a series of interesting directories and files on a given site.
  • Cmb
    Cmb is a small utility that creates all the possible combinations from a user mask (that includes wildcards) and dumps them to stdout.
  • containers
    containers is a simple implementation of containers for Linux, making secure containers as easy to create and use as a traditional chroot.
  • Crank
    Crank is short for "CRyptANalysis toolKit". Its overall purpose is to provide a powerful and extensible environment for solving classical (pen-and-paper) ciphers, providing as much automation as possible.
  • cryptmount
    cryptmount is a utility which allows an ordinary user to mount an encrypted filing system on-demand, using the device-mapper infrastructure, but without requiring superuser priveleges. Filing systems can be hosted on either raw block devices or ordinary files, with loopback devices setup automatically.
  • CryptoHawk
    CryptoHawk is a program about cryptography. It can calculate hashes (md2,md4,md5,sha-1,sha-256 and hmac). It can also perform cryptanalysis like frequency analysis for substutition cipher and exhaustive key search for rotation cipher, as well as searching internet databases for md5 hashes.
  • CrySyS Duqu Detector Toolkit
    CrySyS Duqu Detector Toolkit is a detector toolkit that combines simple detection techniques to find Duqu infections on a computer or in a whole network. The toolkit contains signature and heuristics based methods and it is able to find traces of infections where components of the malware are already removed from the system.
  • cvechecker
    cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database.
  • dcfldd
    dcfldd is an enhanced version of dd with features useful for forensics and security. dd copies a file (from standard input to standard output, by default) converting and formatting according to the options supplied. Read more
  • DenyHosts
    DenyHosts is a Python program that automatically blocks ssh attacks by adding entries to /etc/hosts.deny. DenyHosts will also inform Linux administrators about offending hosts, attacked users and suspicious logins. Read more
  • DeTraS
    DeTraS provides several tools to track development activities by registering applications that developers use on a X Window session. It also allows you to send collected data to a server and takes care about your privacy.
  • dradis
    dradis is a tool for sharing information during security testing. While plenty of tools exist to help in the different stages of the test, not so many exist to share interesting information captured. When a team of testers is working on the same set of targets, having a common repository of information is esential to avoid duplication of efforts.
  • EsteidUtil
    EsteidUtil is a wxWidgets GUI tool for managing the Estonian ID smartcard. It allows the user to see the data on th card, change PINs, and perform some basic diagnostics both on card and necessary opsys configuration. The code has useful low-dependency C++ classes for other kinds of smartcard handling.
  • FakeBO
    FakeBO fakes trojan server responses (Back Orifice, NetBus, etc.) and logs every attempt to a logfile, stdout/stderr or syslog. It is able to send fake pings and replies back to the client which is trying to access your system.
    FBAC-LSM is a security mechanism for Linux which retricts applications based on the features they provide, such as "Web Browser" or "Image Editor".
  • fe3d
    A multiplatform, SDL/OpenGL based 3D visualization tool for network (security) information, it currently supports's nmap and [has very very limited support for] languard XML log files.
  • FileInfo
    FileInfo is an GUI forensic tool for Ubuntu Linux written in Python, that helps you in identifying files with specific values for certain attributes in order to search and sort these files and present the results in an easily readable tabular fashion.
  • Firejail
    Firejail is a SUID sandbox program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces.
  • Firewall Builder for Cisco IOS ACL
    Firewall Builder for Cisco IOS ACL completes a set of tools designed to manage a multi-tiered network security system. This module can generate access control list configuration for Cisco routers running IOS 12.x. The Firewall Builder GUI's built-in installer uses ssh to communicate with the router to install the generated ACL configuration. Several installation methods are provided to make sure the management workstation is not "cut off" from the router in the middle of ACL activation. Firewall Builder's built-in policy importer can be used to import existing router configurations.
  • Fortools_dd
    Fortools_dd is a set of forensic apps, created with zenity, for terminal commandos and bash scripts in Linux.
  • Frankenwall
    Frankenwall is a bash shell script intended to create a highly secure IPTables based linux firewall/router with QOS/traffic shaping/bandwidth management.
  • GDecrypt
    GDecrypt was written for making the use of decrypted partitions under Linux more easy. It currently contains a GUI written in PyGTK for decrypting/mounting, unmounting and encryption partitions or container files and it supports partitions created with truecrypt and LUKS
  • glFlow
    glFlow is a robust, fast, portable, pcap-centric (D)DoS detection tool.
  • gnoMint
    gnoMint is a tool for easily creating and managing certification authorities. It provides fancy visualization of all the pieces of information that pertain to a CA, such as x509 certificates, CSRs, and CRLs.
  • gpgutils
    gpgutils is a set of utilities for GNUPG. It includes gpgedit, gpgsignfiles, and gpgverifyfiles. These allow encryption and code signing tasks to be simplified.
  • Graudit
    Graudit is a simple script and signature sets that allows you to find potential security flaws in source code using the GNU utility grep.
  • Hamachi
    Hamachi is a zero-configuration virtual networking system featuring an open security architecture, NAT-to-NAT traversal, and multi-platform client software.
  • Hashrat
    Hashrat is a hash-generation utility that supports the md5, sha1, sha256, sha512, whirlpool, jh-244, jh256, jh-384 and jh-512 hash functions, and also the HMAC versions of those functions.
  • Heimdal
    Heimdal is an implementation of Kerberos 5 that aims to be protocol compatible with existing implementations and RFC 1510. It is also reasonably compatible with the M.I.T Kerberos V5 API, supports Kerberos V5 over GSS-API (RFC 1964), includes a number of important and useful applications (rsh, telnet, popper, etc.), and is backwards compatible with Kerberos V4.
  • Hogwash
    Hogwash is an intrusion detection system(IDS)/packet scrubber. Hogwash can detect attacks on your network, and if you want, filter them out.
  • honeytrap
    Honeytrap is a network security tool written Honeytrap is a network security tool written to observe attacks against TCP services. As a low-interactive honeypot, it collects information regarding known or unknown network-based attacks and thus can provide early-warning information.
  • HUNT
    HUNT is a tool for exploiting well known weaknesses in the TCP/IP protocol suite.

Next 50

Share this Page
Bookmark and Share
Submit this page to popular social networks such as Digg, Twitter, StumbleUpon and more.

My LinuxLinks
  • Bookmarked links
  • Emailed Newsletter
  • Your own profile

  • Top Applications
    Top Free Software
    6 Lean Desktops
    14 File Managers
    21 Backup Tools
    21 Window Managers
    21 Productivity Tools
    21 Text Editors
    21 Video Emulators
    21 Home Emulators
    42 Graphics Apps
    42 Scientific Apps
    42 Email Apps
    12 Instant Messaging
    42 Games
    42 More Games
    21 More Games
    42 Audio Apps
    42 Video Apps
    80 Security Apps
    Free Console Apps
    14 Multimedia
    'Free' Proprietary
    21 Closed-Source Apps
    Top Commercial Apps
    42 Games
    Free Web Software
    21 Web CMS
    14 Wiki Engines
    8 Blog Apps
    6 eCommerce Apps
    Other Articles
    Migrating from Windows
    Distribution Guide
    Distro Portal Pages

    Migrate to Linux
    Thinking of switching to Linux? Check out our Linux Equivalents to Windows Software section, highlighting popular Linux equivalents to Windows software.

    This feature also includes over 150 individual software portal pages including Blender, Scribus,, Evolution, Eclipse, K3b, and MythTV, providing a wealth of essential information.


    Distribution Guides
    Distro Guide


    Linux Mint
    64 Studio

    Berry Linux

    Entire List


    Web Calendar
    Linux Licenses

    Advertise at


    Latest Portal Pages


    Add Link | Modify Link | About | FAQ | Guide | Privacy | Awards | Contact |
    Portal Version 0.7. Intel Blade.
    Comments to the webmaster are welcome.
    Copyright 2009 All rights reserved.