We recommend steganography tools captured in a LinuxLinks-style ratings chart. All the software is free and open source goodness.
Read moreCategory: Security
9 Useful Free and Open Source Reverse Vulnerability Analysis Tools
Vulnerability analysis is an essential activity for enterprise security. We recommend useful open source tools.
Read moreNosey Parker – find secrets in textual data
Nosey Parker is a command-line program that finds secrets and sensitive information in textual data and Git history.
Read more9 Best Free and Open Source Wireless Security Tools
Wireless security is the prevention of unauthorized access or damage to computers or data using wireless networks, which include Wi-Fi networks.
Read more8 Best Free and Open Source Network Intrusion Detection Systems
An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations.
Read morepsad – intrusion detection and log analysis with iptables
psad is software which offers intrusion detection and log analysis with iptables.
Read more12 Best Free and Open Source Firewall Tools
We recommend free and open source firewall tools.
Read morePortmaster – application firewall that does the heavy lifting
Portmaster is an application firewall. Restore privacy and take back control over all your computer’s network activity.
Read moreBeEF – The Browser Exploitation Framework
BeEF is pioneering techniques that provide penetration testers with practical client-side attack vectors.
Read more16 Best Free and Open Source Network Analyzers
A network analyzer (also known as a packet analyzer, packet sniffer, or protocol analyzer) is software that intercepts and logs traffic that passes over a computer network or part of a network.
Read moreawall – Linux firewall configuration tool
awall is a Linux firewall configuration tool, providing various benefits over plain iptables.
Read more13 Best Free and Open Source Anti-Malware Tools
Security is paramount. Security involves defence in depth. Approaching security one step at a time, with consistency and rigour, you can mitigate threats, and keep intruders at bay.
Read morebgpipe – BGP reverse proxy and firewall
The vision for bgpipe is to be a powerful BGP firewall that transparently secures, enhances, and audits existing BGP speakers.
Read moreFastFinder – fast suspicious file finder
FastFinder is a lightweight tool made for threat hunting, live forensics and triage.
Read moretcpflow – TCP/IP packet demultiplexer
tcpflow is a program that captures data transmitted as part of TCP connections (flows), and stores the data.
Read more