CERIAS Hotlist
Page Content
- CERIAS: Center for Education and Research in Information Assurance and Security
The worlds foremost university center for multidisciplinary
research and education in areas of information security and information assurance.
http://www.cerias.purdue.edu/ - Added Dec 10, 1999
- Access Password Recovery
Tool to unprotect password protected access database. A must for database administrators to defeat MS Access security and regain access to database in case of lost password.
http://www.accesspasswordrecovery.com - Added Dec 03, 2006
- ACMAINT
An account creation and Maintenance system for distributed UNIX systems.
http://ftp.cerias.purdue.edu/pub/tools/unix/sysutils/acmaint... - Added Jun 18, 2003
- Alec Muffett's homepage
Alec Muffett's homepage which links to software he has written including Crack.
http://www.users.dircon.co.uk/~crypto/ - Added Dec 10, 1999
- An Online Firewall Resource Directory
FireWallWeb.net is a comprehensive, categorized directory of network security and firewall related web sites. Free information resources and tools as well as commercial products and services are listed under dozens of relevant topics and categories.
http://www.firewallweb.net - Added Mar 08, 2006
- anlpasswd
Password program to prevent poor password choices.
http://ftp.cerias.purdue.edu/pub/tools/unix/pwdutils/anlpass... - Added Jun 18, 2003
- AntiCode: AntiOnline's Software Archive
AntiCode is part of the AntiOnline Network of Security Related Sites. It contains an archive of code.
http://anticode.antionline.com/download.php - Added Feb 19, 2001
- AntiOnline
Hackers know the weaknesses in your system, shouldn't you?
http://www.antionline.com/ - Added Nov 06, 2000
- Argus Systems Group, Inc.
http://www.argus-systems.com/ - Added Dec 10, 1999
- Artistscope
Artistscope provided the first solution that offered protection of an image once downloaded to a browser, Secure Image. Currently working on new developements for image security.
http://www.artistscope.com/ - Added Sep 25, 2000
- AS/400 Security World: AS/400 Audit, AS400 Security & AS/400 Control
AS/400 Security World: Where to find AS/400 Audit, AS400 Security & AS/400 Control Solutions
http://www.as400security.net/ - Added Dec 17, 2000
- AttackPrevention Network Security Whitepapers and Tools
AttackPrevention has nearly 3,000 free network security whitepapers and security tools. Research Cryptology, Firewalls, Policies and Procedures, Security Tools, Servers, VoIP, and WiFi.
http://www.attackprevention.com/ - Added Feb 08, 2006
- Audit and e-Security Checklists for LAN/Network, Firewalls, etc
Audit and security review checklists for: firewalls, LAN/networks, internet... essentially for the e-commerce security infrastructure.
http://www.e-security-e-commerce-security.com - Added Nov 21, 2001
- Authentication Server Daemon
Implementation of RFC 931.
http://ftp.cerias.purdue.edu/pub/tools/unix/daemons/authd/ - Added Jun 18, 2003
- Ballista at Carnegie Mellon
http://www-2.cs.cmu.edu/afs/cs/project/edrc-ballista/www/ - Added Dec 10, 1999
- Best Electronic Stores
BestElectronicStores.info is a comprehensive guide on electronic stores, electronic supply stores, online electronic stores, electronic component stores and computer electronic stores. Offers each and every information about electronic store reviews, latest electronic store news and electronic stores ratings,
Provides informative links for electronics stores, electronics store chain and major electronic stores.
http://bestelectronicstores.info/ - Added Mar 16, 2006
- Big Crocodile v3.0
safely store sensitive password information
http://downloads-zdnet.com.com/3000-2092-9018380.html?tag=ls... - Added Dec 15, 2000
- Cain & Abel
Cain & Abel is a password recovery tool for Windows.
http://www.oxid.it/cain.html - Added Mar 16, 2006
- Captus Networks
Integrated intrusion prevention and traffic shaping technology to stop Dos/DDoS attacks and manage bandwidth usage. Free vulnerability assessment toolkit and whitepapers available.
http://www.captusnetworks.com - Added Jul 24, 2003
- checkXUsers
Checks for logins coming from insecure X servers.
http://ftp.cerias.purdue.edu/pub/tools/unix/sysutils/checkXu... - Added Jun 18, 2003
- chklastlog
Check lastlog for inconsistencies.
http://ftp.cerias.purdue.edu/pub/tools/unix/logutils/chklast... - Added Jun 18, 2003
- chrootuid
Run a network service from a chrooted environment.
http://ftp.cerias.purdue.edu/pub/tools/unix/sysutils/chrootu... - Added Jun 18, 2003
- CIAC Security Tools
Listing of security tools, resources, etc.
http://ciac.llnl.gov/ciac/SecurityTools.html - Added Dec 10, 1999
- CIAC Security Tools Overview
Overviews and links to all the Security and Audit Tools available through the CIAC like CyberCop, courtney, etc.
http://www.ciac.org/ciac/SecurityTools.html - Added Mar 30, 2001
- Coded Drag
CodedDrag encrypts your personal data using strong encryption algorithms like Triple DES and Blowfish. It was developed as an
example tool to demonstrate the new possibilities of the Windows 95 / NT 4.0 shell.
http://www.fim.uni-linz.ac.at/codeddrag/codedrag.htm - Added Dec 10, 1999
- Command Software Systems
http://www.commandcom.com/ - Added Dec 10, 1999
- Communications Security for the Twenty-first Century: The Advanced Encryption Standard
Int the early 1970s the National Security Agency and the National Bureau of Standards realized that noncombatant adults needed to protect their sensitive, but unclassified, information.
http://www.ams.org/notices/200004/fea-landau.pdf - Added Sep 26, 2000
- computer-monitoring.com
Internet & computer monitoring spy software that secretly records all activities on any computer including emails, websites, IMs, chats, logins, passwords, keystrokes, and more... Find out what your children, spouse, employees, etc. are doing while
http://www.computer-monitoring.com/ - Added Jan 08, 2001
- Counterpage Systems, Computer Security and Cryptography Consulting
Provides a full range of dynamic Managed Security Monitoring services taht enable safe e-business.
http://www.counterpane.com/ - Added Dec 10, 1999
- Cyberguard
Cyberguard
http://www.cyberguard.com - Added Feb 05, 2003
- Cybertrace
Our three main areas of strength are network design and implementation, administration and security, and corporate Web and database design and management. Our expertise ranges from the hardware of telephony, bridges, routers, and various computers th
http://www.cybertrace.com/ - Added Dec 10, 1999
- Dark Lab Mailing List
The purpose is to go the next step in full disclosure and perform full documentation and technical in-depth discussions in an open environment. Recend developments and a decreasing technical level on well-known lists required this step. Instead of preventing people from knowing stuff, we want interested people to know and at the same time push them to learn more.
http://www.darklab.org/ - Added Apr 22, 2003
- Data Recovery Software
Software tools to recover deleted files and lost data. Also available file repair tools to repair corrupt files.
http://www.nucleustechnologies.com - Added Aug 07, 2006
- DCE Homepage
http://www.opengroup.org/tech/dce/ - Added Dec 10, 1999
- Dec Alpha OSF Mailing List
This list deals with issues pertaining to OSF on DEC Alpha based stations. Send email to majordomo@ORNL.GOV with the following in the body:
subscribe alpha-osf-managers
mailto:majordomo@ORNL.GOV - Added Jun 18, 2003
- Deception Tool Kit
Discusses issues surrounding deception and the deception toolkit from the definition of what it is to how to do it
http://www.all.net/dtk/dtk.html - Added Dec 10, 1999
- Disk Recovery Software
Recover your deleted files and lost data easily using data recovery software tools.
http://www.diskdatarecovery.net - Added Oct 19, 2006
- Domain Obscenity Control
DOC diagnoses misbehaving DNS domains.
http://ftp.cerias.purdue.edu/pub/tools/unix/sysutils/doc/ - Added Jun 18, 2003
- DUMPSec
SomarSoft's DumpSec is a security auditing program for Microsoft Windows® NT/XP/200x. It dumps the permissions (DACLs) and audit settings (SACLs) for the file system, registry, printers and shares in a concise, readable format, so that holes in system security are readily apparent. DumpSec also dumps user, group and replication information.
http://www.systemtools.com/somarsoft/index.html - Added Mar 16, 2006
- ELCOMSOFT: Password Recovery Software
Password recovery software: for archives (ZIP,RAR,ARJ,ACE), MS Office (Word,Excel,Access,Outlook), MS Project, Symantec ACT!, Lotus SmartSuite (WordPro, 1-2-3, Approach, Organizer), Adobe Acrobat PDF, Corel Paradox. Dictionaries, wordlists, wordlist
http://www.elcomsoft.com/prs.html - Added Oct 18, 2000
- Elementary Security for your Linux Box
The real intent of this two-part series is to help you improve
the security of your system and to get you to think securely. One without the other is unlikely to
succeed.
http://www.itworld.com/Comp/2384/LinuxWorld/ - Added Oct 05, 2000
- Enterprise Security Management Systems
4FrontSecurity provides details on the 4FrontSecurity Enterprise Information Security Management System (IMS) and other solutions.
http://www.4frontsecurity.com - Added Jan 14, 2003
- eSecurity
eSecurity
http://www.esecurityinc.com - Added Feb 05, 2003
- ESTec Systems Corporation
http://www.estec.com/ - Added Dec 10, 1999
- Eutron Computer Security Solutions
Eutron è una delle più importanti aziende europee nella messa a punto di soluzioni di
e-technology, la sinergia cioè tra le tecnologie elettroniche digitali e le tecnologie Internet.
http://www.eutron.it/e-tech/index.htm - Added Dec 10, 1999
- Finjan Safe Surfing, The Java Security Software Provider
First-Strike SecurityTM
A "first strike" is the first time a new
malicious code attack is launched.
http://www.finjan.com/ - Added Dec 10, 1999
- Fortified Networks
Fortified Networks Inc. is the leader in Information Security Consulting and we're blazing a trail for others to follow.
http://www.fortified.com/ - Added Dec 10, 1999
- Free Random Password Generator
Create and customize random passwords with this online tool.
http://thebitmill.com/tools/password.html - Added Oct 14, 2005
- Gabriel: Network probe detector for SATAN
http://www.lat.com/gabe.htm - Added Dec 10, 1999
- GemiScorp Software Solutions
Provides innovative and quality software solutions for home and corporate users demanding reliable, user friendly and well-supported security and productivity products. Home of award-winning programs like SafeLogon, SafeSystem, SafeCryptor and LaunchIt NOW! Plus.
http://www.gemiscorp.com - Added Jun 05, 2003
- Getting Kerberos
http://web.mit.edu/network/kerberos-form.html - Added Dec 10, 1999
- Got Cyber Insurance?
An article on hacking insurance
http://www.computerworld.com/cwi/story/0,1199,NAV47_STO48721... - Added Sep 26, 2000
- Hackers Catalog
http://66.40.78.100/ - Added Dec 10, 1999
- Hard Drive Recovery
Nucleus Data Recovery is the biggest provider of data recovery software, email recovery and file repair utility tools around the world. We provide the data recovery solutions for Word, Excel, PowerPoint, Access and others.
http://www.nucleusdatarecovery.org - Added Mar 06, 2007
- IBM Security Homepage
http://www-3.ibm.com/security/index.shtml - Added Dec 10, 1999
- ICAT Vulnerability Metabase
ICAT is a searchable index of computer vulnerabilities. ICAT links users into a variety of publicly available vulnerability databases and patch sites, thus enabling one to find and fix the vulnerabilities existing on their systems. ICAT is not itself
http://icat.nist.gov/icat.cfm - Added Aug 16, 2000
- Industrial Defender from Verano
Industrial Defender is a complete multi-layered security solution designed to protect mission-critical control system environments in applications such as power generation, oil/gas/electricity distribution and transportation systems.
http://www.verano.com - Added Jul 14, 2004
- Information Assurance Technology Analysis Center (IATAC)
Information Assurance Technology Analysis Center (IATAC)is a Department of Defense (DoD) sponsored service available to all government and industrial base users to provide studies, analyses, data gathering and other R&D activities to meet research, acquisition, test, demonstration, operation, and logistics requirements related to IA, DIO, and IW technologies.
http://iac.dtic.mil/iatac/ - Added Aug 25, 2004
- Insecure - Top 75 Security Tools
Expanded list of top 75 security tools.
http://www.insecure.org/tools.html - Added May 25, 2006
- Janus, A Secure Environment for Untrusted Helper Applications
http://www.cs.berkeley.edu/~daw/janus/ - Added Dec 10, 1999
- John the Ripper password cracker
John the Ripper is a password cracker, currently available for UNIX, DOS, Win32. Its primary purpose is to
detect weak UNIX passwords.
http://www.openwall.com/john/ - Added Dec 10, 1999
- L5
L5 produces information on the files in a file system.
http://ftp.cerias.purdue.edu/pub/tools/unix/sysutils/l5/ - Added Jun 18, 2003
- List of vendor security contacts
http://www.molbio.unmc.edu/~cprice/security/vendor_security_... - Added Dec 10, 1999
- Local Area Security Linux
Local Area Security Linux is a Live CD distribution with a small footprint. Containing over 200 information security and administration related tools. As well as a full desktop environment and office productivity applications. With such a small footprint L.A.S. Linux can be optionally loaded and run from physical RAM (assuming there is 256MB or more). We currently have 2 different versions of L.A.S. to fit two specific size requirements.
http://localareasecurity.com - Added Mar 15, 2004
- LV Sales Inc.
http://www.lvsales.com/ - Added Dec 10, 1999
- Netcat
Utility for reading and writing data across a network.
http://ftp.cerias.purdue.edu/pub/tools/unix/netutils/netcat/ - Added Jun 18, 2003
- NetIQ
NetIQ
http://www.netiq.com - Added Feb 05, 2003
- Netpipes
http://web.purplefrog.com/~thoth/netpipes/netpipes.html - Added Dec 10, 1999
- Network Management Tools
Package of several network tools.
http://ftp.cerias.purdue.edu/pub/tools/unix/netutils/netman/ - Added Jun 18, 2003
- New Denial-of-Service Attack Tool uses Relay Chat
Security experts this week say an even more
dangerous tool than the past DoS tools, called Trinity, has just been discovered.
http://www.nwfusion.com/news/2000/0906ddos.html - Added Sep 26, 2000
- NewOrder News
The resource for people to help avoid being hacked, security and exploiting related files and links.
http://neworder.box.sk/news.php3?maxnumber=99 - Added Nov 06, 2000
- ntsecurity.nu
ntsecurity.nu provides unique security tools and information for Windows NT and Windows 2000.
http://ntsecurity.nu/ - Added Aug 16, 2000
- Offline Vulnerability Database Tool
The Hackerstorm vulnerability GUI is a free tool which allows the entire Open Source Vulnerability Database (www.osvdb.org) to be viewed offline.
Its purpose is to assist people who are doing security related work when an internet connection is not available. This usually happens during audits, penetrations tests, risk assesments etc. Having an offline tool makes life a little easier, it has even been used in presentations when people talk about security issues.
The only system requirement to use the tool is a flashplayer 7 enabled web browser, it will work on any OS and with any browser.
The database is updated daily.
This tool is provided freely for personal and professional use.
http://www.hackerstorm.com - Added Jul 12, 2005
- Paradox Security Systems
http://paradox.ca/ - Added Dec 10, 1999
- Passwords recovering, encrypting and Windows security
Here is three security related programs:
1. SAMInside - the fastest program for recovering forgotten users passwords from SAM-files of Windows\'NT/2000/XP, including files, encrypted by Syskey utility.
2. PWLInside - the fastest program for recovering forgotten passwords to PWL-files of Windows\'3.11/95/OSR2/98/ME. Also the program extracts from PWL-files the list of resources with passwords to them.
3. PCResView - the program for retrieving useful information about remote computer in the net, related with his security.
http://www.insidepro.com - Added Mar 30, 2003
- Phenoelit
This site has the comprehensive list of default username/passwords for network devices along with many tools and documentation.
http://www.phenoelit.de/ - Added Apr 22, 2003
- phreak.se
Enormous telecom- & phreaking related archives.
Information, software, images. Never-before seen
material from the insides of telcos worldwide.
http://www.phreak.se - Added Oct 12, 2003
- PortSwigger.net - web application hack tools
Free tools for hacking web applications.
http://portswigger.net - Added Sep 06, 2003
- Prime Factors, Inc
http://www.primefactors.com/ - Added Dec 10, 1999
- Recourse Technologies
Recourse Technologies provides threat management solutions to contain, control, and respond to malicious computer attacks. ManHunt and ManTrap network security and intrusion detection systems protect networks by covertly gathering data on hack attack
http://www.recourse.com/ - Added Jun 05, 2001
- SAIC
A diversified high-technology research and engineering company based in San Diego,
California, Science Applications International Corporation (SAIC) offers a broad range of
expertise in technology development and analysis, computer system devel
http://www.saic.com/ - Added Mar 29, 2000
- SamSpade
SamSpade is a freeware tool that identifies security holes on network hosts.
http://www.samspade.org - Added Mar 16, 2006
- SARA by Advanced Research Corporation
SARA (Security Auditors Research Assistant)
http://www.www-arc.com/sara/ - Added Mar 08, 2000
- Securing your Linux Box
This article will give a brief introduction to securing your Linux box and making your network
environment a safer place for both your data and the people who use use it.
http://www.linuxgazette.com/issue34/vertes.html - Added Oct 05, 2000
- Security Awareness, Inc
SAI produces professional, effective, and affordable IT
security awareness products for all types of organizations. We aim to
strengthen the human component of IT security. Products include posters,
screensaver, intranet site, and more.
http://www.securityawareness.com/ - Added Mar 13, 2000
- Security Research at IBM Watson
http://www.research.ibm.com/security/ - Added Dec 10, 1999
- SGI: The Information Vault
The purpose of
these pages is to provide an information resource on
computer security for the SGI computing environment
http://www.sgi.com/support/security/index.html - Added Dec 10, 1999
- SiegeSoft
Protect your online privacy with Siegesoft's suite of products. Great way to keep your personal business personal.
http://www.siegesoft.com/ - Added Aug 11, 2000
- Software Piracy Solutions & Antipiracy Software
Antipiracy World: Where to find Software Piracy Solutions & Anti-Piracy Software.
http://www.antipiracyworld.com/ - Added Jan 27, 2001
- SpamFreeze
SpamFreeze is a free anti-spam service provided by SpamButcher for webmasters, Bloggers and anyone else who needs to publish their address online without fear of being spammed.
SpamFreeze works by hiding your email address from spambots that crawl the web looking for victims to send junk email to.
http://www.spambutcher.com/spamfreeze/ - Added Jan 02, 2007
- Spyware Guide
The Spyware Guide was created to provide an all inclusive and updated resource on spy ware applications, what they do and how they're used.
http://www.spywareguide.com/ - Added Apr 01, 2005
- Ssh (Secure Shell) Home Page
http://www.ssh.com/ - Added Dec 10, 1999
- Standing the Test of Time: The Data Encryption Standard
The workhorse private key is the data encryption standard (DES), which relies on cryptographic design principles that predate public key.
http://www.ams.org/notices/200003/fea-landau.pdf - Added Sep 26, 2000
- Sunrise Promotions
http://www.heureka.clara.net/sunrise/ - Added Dec 10, 1999
- Synack Communications
Synack Communications is a small consulting company specializing in network programming.
http://www.synack.com/ - Added Dec 10, 1999
- The Kerberos Network Authentication Service
http://www.isi.edu/gost/info/Kerberos/ - Added Dec 10, 1999
- The Offline Utility to Change NT Passwords
This is a utility to (re)set the password of any user that has a valid (local) account on your NT system, by modifying the crypted password in
the registrys SAM file.
http://home.eunet.no/~pnordahl/ntpasswd/ - Added Dec 10, 1999
- The Security Audit and Internal Audit Shop
Checklists, plans and resources for security audit and internal audit
http://www.security-audit-internal-audit.com - Added Nov 25, 2001
- Tiamat
Great resource, a bit off the beaten path...
http://my.en.com/~tiamat/lair.html - Added Dec 10, 1999
- TigerTools.net
Everything you need for a professional security analysis - hacking to discover, scan, penetrate, expose, control, spy, flood, spoof, sniff, infect, report, monitor and more.
http://www.tigertools.net/ - Added Jul 28, 2000
- TopLang software
Computer security and access control- Desktop Lock, Folder Lock folder protection - File Lock, Add pssword protection to programs - Password Door.
http://www.toplang.com - Added May 24, 2004
- Tripwire Data Security Products
http://www.tripwiresecurity.com/ - Added Dec 10, 1999
- Unix Host and Network Security Tools
A listing of network security tools and sites where they can be obtained. If you have any comments or updates, please send email
to the address below.
http://cs-www.ncsl.nist.gov/tools/tools.htm - Added Dec 10, 1999
- userv - user services client and daemon
http://www.chiark.greenend.org.uk/~ian/userv/ - Added Dec 10, 1999
- VanDyke Software
VanDyke Software
http://www.vandyke.com - Added Feb 05, 2003
- Voice Security
http://www.voice-security.com/ - Added Oct 05, 2000
- Wave Systems Corp
http://www.wavesys.com/ - Added Dec 10, 1999
- Welcome to CRYPTOGRAPHY.COM
Advancing academic research and providing industry-leading commercial services in cryptography and data security.
http://www.cryptography.com/ - Added Dec 10, 1999