List Categories and Listings by B

Do you need to analyze multiple variations of essentially the same program ? Do you need to understand the changes between two versions of a program ? Are you trying to detect code theft ? SABRE BinDiff uses a unique graph-theoretical approach to allow co ...

Category Forensic Tools
VendorZynamix GmbH
Pricing ModelCommercial
Modified

The Black Hat Briefings brings together a unique mix in security: the best minds from government agencies and global corporations with the most respected independent researchers and hackers. These forums take place regularly in Las Vegas, Amsterdam, Tokyo ...

ModifiedNever

The Barracuda Spam Firewall is compatible with all email servers and can fit into nearly any corporate or small business environment. It is used by small organizations with as few as 10 employees and large organizations with as many as 200,000 employees. ...

Category Appliances
VendorBarracuda Networks
Pricing ModelCommercial
Modified

Bro

Bro is a network analysis framework that is different from the typical IDS. Adaptable - Bro's domain-specific scripting language enables site-specific monitoring policies. Efficient - Bro targets high-performance networks and is used operationally at ...

Category IPS Network
VendorProject Team led by Vern Paxson
Pricing ModelOpen Source
Modified

bsd-airtools is a package that provides a complete toolset for wireless 802.11b auditing. Namely, it currently contains a bsd-based wep cracking application, called dweputils (as well as kernel patches for NetBSD, OpenBSD, and FreeBSD). It also contains a ...

Category Wireless Tools
Vendordachb0den labs
ModifiedNever

The gun, which is called the BlueSniper rifle, can scan and attack Bluetooth devices from more than a mile away.

VendorDIY
Modified

btscanner 2.0 is a completely revamped version of the original. With all the features of 1.0, version 2.0 now boasts the ability to do brute force scans of OUI ranges. Both inquiry and brute force scan types are able to utilise multiple dongles to increas ...

VendorPentest Limited
Pricing ModelFreeware
Modified
Vendorcode bluetest.pl
Modified

small bluetooth audit suit containing psm_scan, rfcomm_scan and a script for generating database entries for btdsd

Vendorcode bt_audit
Modified

BlueSpam searches for all discoverable bluetooth devices and sends a file to them (spams them) if they support OBEX. By default a small text will be send. To customize the message that should be send you need a palm with an SD/MMC card, then you create th ...

VendorPalmOS
Modified

Blueprinting is a method to remotely find out details about bluetooth-enabled devices. Blueprinting can be used for generating statistics about manufacturers and models and to find out whether there are devices in range that have issues with Bluetooth sec ...

VendorCollin Mulliner and Martin Herfurt
Modified

Blooover is a proof-of-concept tool that is intended to run on J2ME-enabled cell phones that appear to be comparably seamless. Blooover is a tool that is intended to serve as an audit tool that people can use to check whether their phones and phones of fr ...

VendorJ2ME Phones
Modified

Bluesnarfer will download the phonebook of any mobile device vulnerable to bluesnarfing.

Modified

BlackICE teams a personal firewall with an advanced intrusion detection system to constantly watch your Internet connection for suspicious behavior. BlackICE responds immediately by alerting you to trouble and instantly blocking the threat.

VendorInternet Security Systems
Pricing ModelCommercial
Modified
BullGuard Internet Security

BullGuard Internet Security inspects your system prior to installation, removes any active malware and adapts to your system specifications. This process ends with a check to ensure the very latest virus definitions are installed. In no time, BullGuard is ...

VendorBullGuard Ltd.
Pricing ModelCommercial
Modified

The BizGuardian Firewall provides the most reliable Unix Kernel (FreeBSD) customized in a highly secure, easy to install software appliance that can turn any old Pentium class computer into a high performance Firewall. The complexity of installing Unix, a ...

VendorBizGuardian
Pricing ModelCommercial
Modified

The BorderGuard client provides Windows users with easy-to-create, high-security VPN connections that are compatible with client/server applications.

Category VPN Clients
VendorBlue Ridge Networks, Inc.
Pricing ModelCommercial
Modified

The BorderGuard 6000 Secure Communications Platform builds on a decade-long legacy of offering the best combination of price, performance, reliability, and security in the industry.

Category VPN Servers
VendorBlue Ridge Networks, Inc.
Pricing ModelCommercial
Modified

BCWipe can be run from My Computer as well as from a command-line prompt. BCWipe v.3 is a powerful set of utilities which complies with the US DoD 5200.28-STD standard and Peter Gutmann wiping scheme. You can also create and use you own customized wiping ...

VendorJetico
Pricing ModelCOMMERCIAL
Modified

The standard in low-level applications for forensics and recovery has always been ByteBack. Now with version 4, we're even better. The addition of UDMA, ATA & SATA support, with memory management and greater ease and control of Partition and MBR manipulat ...

Category Forensic Tools
VendorTech Assist, Inc
Pricing ModelCOMMERCIAL
Modified

© Computer Network Defence Limited 2019