Home > Computers > Software > Operating Systems > Unix > Security > Admin Tools-Software
http://www.gnupg.org/
OpenPGP (RFC2440) implementation from the GNU project. Encrypts/decrypts/signs/digests files using strong cryptography. FAQ, downloads, documentation.
http://www-nrg.ee.lbl.gov/nrg.html
Tools such as tcpdump and traceroute.
http://logsurfer.sourceforge.net/
Allows improved monitoring and alerting based on the contents of system logs.
http://freecode.com/projects/lsof
lsof is a tool for examining I/O channels open on your Unix system. These can include files, FIFOs and network sockets. This information can be extremely useful for security and a variety of other purposes. Works on most Unix-like systems.
https://cisofy.com/lynis/
Unix system and security auditing tool.
http://mcrypt.sourceforge.net/
A replacement for the Unix crypt, using several block algorithms in several modes like cbc, and cfb.
https://nmap.org/
Efficient stealth port scanner. Downloads, e-mail lists, news.
http://cryptography.org/
Strong cryptographic software, libraries, and information about cryptography, data security, and privacy.
http://www.openssh.com/portable.html
Open source implementation of SSH1 and SSH2 protocols. Ported from OpenBSD by the OpenSSH portability team.
http://www.openssl.org/
The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, fully featured, and Open Source toolkit implementing the Secure Sockets Layer and Transport Layer Security protocols with full-strength cryptography world-wide.
ftp://ftp.lysator.liu.se/pub/ident/servers/
Daemon implementing IDENT protocol, it can be used to identify the user who initiated a TCP/IP connection
http://www.postfix.org/
Drop-in Sendmail replacement by Wietse Venema. Offers several features that make it difficult to crack.
http://www.s4software.com/sg.htm
Secure4Privilege is a tool for complete access control to commands and scripts without giving out the root password.
http://www.wwdsi.com/saint/
(Security Administrator's Integrated Network Tool) Scans systems and networks and reports potential vulnerabilities.
http://www.sudo.ws/
Run selected commands as root, with the users' own password. Allows the administrator to grant limited root privileges to a subset of users, without giving out the root password.
http://www.porcupine.org/forensics/tct.html
The Coroner's Toolkit (TCT) provides post-break-in data collection that could be useful in determining what happened. Less polished that the authors (Dan Farmer and Wietse Venema) usual work, the toolkit offers a patch-work of tools that help exhume interesting stuff from violated systems. Should be installed and examined before a break-in happens!
http://www.tripwire.com/
Offers IT security and regulatory compliance solutions through incident detection and continuous monitoring.
http://www.tripwire.org/
Open source version of the original Unix file integrity scanner. Calculates and stores signatures of file permissions, ownership and contents. Scans the same files later, detecting changes. This open source version is targeted at Linux systems.
Home > Computers > Software > Operating Systems > Unix > Security > Admin Tools-Software
Thanks to DMOZ, which built a great web directory for nearly two decades and freely shared it with the web. About us