blank.gif (43 bytes)

Church Of The
Swimming Elephant

Search:

Vulnerabilty Scanners

Asmodeus Network Security Scanner for NT Asmodeus Network Security scanner for Win NT 4.0
bv-Control for Internet Security bv-Control (formerly branded as HackerShield) is the easiest way to find and close security holes on the network. For systems and network administrators, who need to ensure their company's assets are protected from hackers, HackerShield is anti-hacker software that finds and closes the holes that hackers use to break into servers, workstations and other network devices.
cattscanner Lists the services target hosts are running and the owner of those processes Lists the NFS shares of the target host Lists the RPC services of the target host Retrieves the Netbios name of the target host and its users Version identification of multiple common ftp and mail transfer services Extremely portable Multi-threaded Self Contained (uses no external libraries except libc) Extremely readable source Generates output to interlinked HTML files (more methods to come) and best of all its FREE
COPS (Computer Oracle and Password System.) COPS is a collection of security tools that are designed specifically to aid the typical UNIX systems administrator, programmer, operator, or consultant in the oft neglected area of computer security.
forixntdemo ForixNT is an NT vulnerability scanner...and so much more! ForixNT is a flexible, extensible toolkit that NT administrators can use to automate policy-based security management in a way that fits their infrastructure. Rather than spending $1000's for a commercial product, NT administrators can use ForixNT to collect configuration information from NT systems across the enterprise.
ISS Internet Scanner provides automated security vulnerability detection and analysis for devices on a network. This policy-driven process measures and manages information security risk, allowing Administrators to match security policy with rapidly changing demands for open networking applications and increasingly complex network environments.
MacAnalysis MacAnalysis is a security auditing suite for your Macintosh to perform and help implement a security standard for your computer/network by performing a full security check of network protocols, open services, port scans, vulnerable CGI scripts and much more. There has never been such a complete package to help maintain a secure network by running security audits for the MacOS! This will scan your Macintosh, Unix, Windows, and Hardware for any vulnerable security holes!
Nessus The Nessus Security Scanner is not only another security auditing tool. It is a security auditing as I think it should be - never trust the version number, never trust that a given service is listenning on the good port (do all the web servers on earth listen on port 80 ?).
Pandora The SATAN of Netware
Retina Retina is designed to identify and alert security vulnerabilities, suggest fixes and report possible security holes within a network’s Internet, Intranet and Extranet systems. Its’ superior scanning capabilities provide a network with the most comprehensive security analysis available.
SAINT SAINT (Security Administrator's Integrated Network Tool) is a security assesment tool based on SATAN. Features include scanning through a firewall updated security checks from CERT & CIAC bulletins, 4 levels of severity (red, yellow, brown, & green) and a feature rich HTML interface.
SARA The Security Auditor's Research Assistant (SARA) is a third generation Unix-based security analysis tool that is:
SANS/ISTS Certified New 
CVE standards support New 
Enterprise search module New 
Sandalone or daemon mode New 
Free-use open license 
Updated twice a month 
User extension support 
Based on the SATAN model 
SATAN Security Administrator's Tool for Analyzing Networks
TIGER 'tiger' is a set of scripts that scan a Un*x system looking for security problems, in the same fashion as Dan Farmer's COPS. 'tiger' was originally developed to provide a check of UNIX systems on the A&M campus that want to be accessed from off campus (clearance through the packet filter). As such, we needed something that *anyone* could run if they could figure out how to get it down to their machine.
vlad VLAD the Scanner is an open-source security scanner that checks for the SANS Top Ten security vulnerabilities commonly found to be the source of a system compromise. It has been tested on Linux, OpenBSD, and FreeBSD. It requires several Perl modules to run (see the README for more details).
Whisker A sophisticated CGI (in)security scanner.
whisker 1.4 + SSL This is a modified version of the whisker web scanning tool written by RFP. It adds native SSL support (the -x option) via the Net::SSLeay module and OpenSSL.

Cotse.Net

Protect yourself from cyberstalkers, identity thieves, and those who would snoop on you.
Stop spam from invading your inbox without losing the mail you want. We give you more control over your e-mail than any other service.
Block popups, ads, and malicious scripts while you surf the net through our anonymous proxies.
Participate in Usenet, host your web files, easily send anonymous messages, and more, much more.
All private, all encrypted, all secure, all in an easy to use service, and all for only $5.95 a month!

Service Details

 
.
www.cotse.com
Have you gone to church today?
.
All pages ©1999, 2000, 2001, 2002, 2003 Church of the Swimming Elephant unless otherwise stated
Church of the Swimming Elephant©1999, 2000, 2001, 2002, 2003 Cotse.com.
Cotse.com is a wholly owned subsidiary of Packetderm, LLC.

Packetderm, LLC
210 Park Ave #308
Worcester, MA 01609