找回密码
 用户注册

QQ登录

只需一步,快速开始

查看: 5488|回复: 0

测试工具箱 - Security test tools

[复制链接]
发表于 2009-9-3 09:46:53 | 显示全部楼层 |阅读模式
Babel Enterprise
Description:
BabelEnterprise manages the risk, dividing it by domains (groups ororganizations), assets and policies. With all this, it can be checked,point by point the fully compliance of a security regulation, such asUNE-ISO/IEC 27001 or other ones that depend on this such as LOPD, SOX,etc.
Requirement:
Linux, Solaris, WinXP, HP-UX, IBM AIX
Download data:
                        Downloadable files: 6792 total downloads to date
                       

BFBTester - Brute Force Binary Tester
Description:
BFBTesteris good for doing quick, proactive security checks of binary programs.BFBTester will perform checks of single and multiple argument commandline overflows and environment variable overflows. It can also watchfor tempfile creation activity to alert the user of any programs usingunsafe tempfile names.
Requirement:
POSIX, BSD, FreeBSD, OpenBSD, Linux
Download data:
                        Downloadable files: 8590 total downloads to date
                       

CROSS
Description:
TheCROSS (Codenomicon Robust Open Source Software) program is designed tohelp open source projects fix critical flaws in their code.Codenomicon's CROSS program provides open source projects with fullaccess to its award-winning DEFENSICS testing solutions, helping theprojects find and fix a large number of critical flaws very rapidly.
Requirement:
130 protocol interfaces and formats
Download data:
                        No data feed available

Flawfinder
Description:
Programthat scans C/C++ source code and reports potential security flaws. Bydefault, it sorts its reports by risk level (the riskiest operations inthe code are listed first).
Requirement:
Python 1.5 or greater
Download data:
                        No data feed available

Gendarme
Description:
Gendarmeis a extensible rule-based tool to find problems in .NET applicationsand libraries. Gendarme inspects programs and libraries that containcode in ECMA CIL format (Mono and .NET) and looks for common problemswith the code, problems that compilers do not typically check or havenot historically checked.
Requirement:
.NET (Mono or MS runtime)
Download data:
                        No data feed available

Metasploit
Description:
TheMetasploit Framework is an advanced open-source platform fordeveloping, testing, and using exploit code. This project initiallystarted off as a portable network game and has evolved into a powerfultool for penetration testing, exploit development, and vulnerabilityresearch.
Requirement:
Win32 / UNIX
Download data:
                        No data feed available

Nessus
Description:
TheNessus vulnerability scanner is the world-leader in active scanners,featuring high speed discovery, configuration auditing, assetprofiling, sensitive data discovery and vulnerability analysis of yoursecurity posture. Nessus scanners can be distributed throughout anentire enterprise, inside DMZs, and across physically separatenetworks. Note that Nessus 3.x is propietary, while Nessus 2.x is opensource, which the vendor has committed to maintaining.
Requirement:
Linus, Solaris, Mac, Windows
Download data:
                        No data feed available

Nikto
Description:
Niktois an open source web server scanner which performs comprehensive testsagainst web servers for multiple items, including over 3200 potentiallydangerous files/CGIs, versions on over 625 servers, and versionspecific problems on over 230 servers.
Requirement:
Windows/UNIX
Download data:
                        No data feed available

Oedipus
Description:
Oedipusis an open source web application security analysis and testing suitewritten in Ruby. It is capable of parsing different types of log filesoff-line and identifying security vulnerabilities. Using the analyzedinformation, Oedipus can dynamically test web sites for application andweb server vulnerabilities.
Requirement:
OS Independent
Download data:
                        No data feed available

OSSTMM - Open Source Security Testing Methodology Manual
Description:
This manual is to set forth a standard for Internet security testing.
Requirement:
Download data:
                        No data feed available

Paros
Description:
Parosis for people who need to evaluate the security of their webapplications. It is completely written in Java. All HTTP and HTTPS databetween server and client, including cookies and form fields, can beintercepted and modified.
Requirement:
Cross-platform, Java JRE/JDK 1.4.2 or above
Download data:
                        No data feed available

WebScarab
Description:
WebScarabis a loose suite of web application security assessment tools writtenentirely in Java. It is a tool primarily designed to be used bydevelopers who can write code themselves.
Requirement:
OS Indpendent
Download data:
                        No data feed available

Wireshark
Description:
Wireshark,formerly known as Ethereal, is used by network professionals around theworld for troubleshooting, analysis, software and protocol development,and education. It has all of the standard features you would expect ina protocol analyzer, and several features not seen in any other product.
Requirement:
Unix, Linux, and Windows
Download data:
                        No data feed available

For those projects hosted on SourceForge, the project activity data is updated weekly using live newsfeeds powered by CaRP
您需要登录后才可以回帖 登录 | 用户注册

本版积分规则

Archiver|手机版|小黑屋|ACE Developer ( 京ICP备06055248号 )

GMT+8, 2024-4-30 22:04 , Processed in 0.013193 second(s), 6 queries , Redis On.

Powered by Discuz! X3.5

© 2001-2023 Discuz! Team.

快速回复 返回顶部 返回列表