List Categories and Listings by B

Zynamix GmbH
Commercial
Pricing Model

Do you need to analyze multiple variations of essentially the same program ? Do you need to understand the changes between two versions of a program ? Are you trying to detect code theft ? SABRE BinDiff uses a unique graph-theoretical approach to allow co ...

Category Forensic Tools
Modified

The Black Hat Briefings brings together a unique mix in security: the best minds from government agencies and global corporations with the most respected independent researchers and hackers. These forums take place regularly in Las Vegas, Amsterdam, Tokyo ...

ModifiedNever
Barracuda Networks
Commercial
Pricing Model

The Barracuda Spam Firewall is compatible with all email servers and can fit into nearly any corporate or small business environment. It is used by small organizations with as few as 10 employees and large organizations with as many as 200,000 employees. ...

Category Appliances
Modified

Bro

Project Team led by Vern Paxson
Open Source
Pricing Model

Bro is a network analysis framework that is different from the typical IDS. Adaptable - Bro's domain-specific scripting language enables site-specific monitoring policies. Efficient - Bro targets high-performance networks and is used operationally at ...

Category IPS Network
Modified
dachb0den labs

bsd-airtools is a package that provides a complete toolset for wireless 802.11b auditing. Namely, it currently contains a bsd-based wep cracking application, called dweputils (as well as kernel patches for NetBSD, OpenBSD, and FreeBSD). It also contains a ...

Category Wireless Tools
ModifiedNever

The gun, which is called the BlueSniper rifle, can scan and attack Bluetooth devices from more than a mile away.

Modified
Pentest Limited
Freeware
Pricing Model

btscanner 2.0 is a completely revamped version of the original. With all the features of 1.0, version 2.0 now boasts the ability to do brute force scans of OUI ranges. Both inquiry and brute force scan types are able to utilise multiple dongles to increas ...

Modified
code bluetest.pl

Modified
code bt_audit

small bluetooth audit suit containing psm_scan, rfcomm_scan and a script for generating database entries for btdsd

Modified

BlueSpam searches for all discoverable bluetooth devices and sends a file to them (spams them) if they support OBEX. By default a small text will be send. To customize the message that should be send you need a palm with an SD/MMC card, then you create th ...

Modified
Collin Mulliner and Martin Herfurt

Blueprinting is a method to remotely find out details about bluetooth-enabled devices. Blueprinting can be used for generating statistics about manufacturers and models and to find out whether there are devices in range that have issues with Bluetooth sec ...

Modified

Blooover is a proof-of-concept tool that is intended to run on J2ME-enabled cell phones that appear to be comparably seamless. Blooover is a tool that is intended to serve as an audit tool that people can use to check whether their phones and phones of fr ...

Modified

Bluesnarfer will download the phonebook of any mobile device vulnerable to bluesnarfing.

Modified
Internet Security Systems
Commercial
Pricing Model

BlackICE teams a personal firewall with an advanced intrusion detection system to constantly watch your Internet connection for suspicious behavior. BlackICE responds immediately by alerting you to trouble and instantly blocking the threat.

Modified
BullGuard Ltd.
Commercial
Pricing Model

BullGuard Internet Security inspects your system prior to installation, removes any active malware and adapts to your system specifications. This process ends with a check to ensure the very latest virus definitions are installed. In no time, BullGuard is ...

Modified
BullGuard Internet Security
Commercial
Pricing Model

The BizGuardian Firewall provides the most reliable Unix Kernel (FreeBSD) customized in a highly secure, easy to install software appliance that can turn any old Pentium class computer into a high performance Firewall. The complexity of installing Unix, a ...

Modified
Blue Ridge Networks, Inc.
Commercial
Pricing Model

The BorderGuard client provides Windows users with easy-to-create, high-security VPN connections that are compatible with client/server applications.

Category VPN Clients
Modified
Blue Ridge Networks, Inc.
Commercial
Pricing Model

The BorderGuard 6000 Secure Communications Platform builds on a decade-long legacy of offering the best combination of price, performance, reliability, and security in the industry.

Category VPN Servers
Modified
COMMERCIAL
Pricing Model

BCWipe can be run from My Computer as well as from a command-line prompt. BCWipe v.3 is a powerful set of utilities which complies with the US DoD 5200.28-STD standard and Peter Gutmann wiping scheme. You can also create and use you own customized wiping ...

Modified
Tech Assist, Inc
COMMERCIAL
Pricing Model

The standard in low-level applications for forensics and recovery has always been ByteBack. Now with version 4, we're even better. The addition of UDMA, ATA & SATA support, with memory management and greater ease and control of Partition and MBR manipulat ...

Category Forensic Tools
Modified

© Computer Network Defence Limited 2021