Skip to main content

Directory: A-Z 

Results 501 - 520 of 1235
GFI Software
Limited Free Trial

Patch management is vital to your business. Network security breaches are most commonly caused by missing network patches. GFI LanGuard scans and detects network vulnerabilities before they are exposed, reducing the time required to patch machines on your ...

Category Network Scanners
GFI LanGuard
eSys
Commercial

Gibraltar is a professional security product for companies and organizations of any size, based on Debian/GNU Linux. Independent of the kind of Internet connection (dedicated line, ADSL, dial-up connection), Gibraltar provides for secure connections. Gibr ...

Lanode
Commercial

Gigabit Data Diodes are fully hardware based ensuring unidirectional transmission without any possibility of data slowing in the reverse direction. They provide an absolute defence against a broad range of external, cross domain and insider cyber threats ...

Category Data Diodes
Gigabit Data Diodes
Guru Labs LC
Commercial

Course Description: This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Enterprise Linux Security Administration course. After a detailed discussion of the TCP/IP suite component protocols and eth ...

Guru Labs, L.C
Commercial

Course Description: This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such as packet filtering, password policies, and file integrity checking are covered. ...

Free Software Foundation, Inc
GPL

GNU Parted is a program for creating, destroying, resizing, checking and copying partitions, and the file systems on them. This is useful for creating space for new operating systems, reorganising disk usage, copying data between hard disks and disk imagi ...

Category Forensic Tools
Jordan Wright
Open Source

Gophish is an open-source phishing toolkit meant to help pentesters and businesses conduct real-world phishing simulations. It is a phishing framework in the Go programming language, released as compiled binaries with no dependencies.

Romain Gaucher
Freeware

Grabber is a web application scanner. Basically it detects some kind of vulnerabilities in your website. Grabber is simple, not fast but portable and really adaptable. This software is designed to scan small websites such as personals, forums etc. absol ...

Category Website Scanners

GRR

Collaboration of developers
Open Source

GRR is an Incident Response Framework focused on Remote Live Forensics. State of the Project August 2011 GRR is in proof of concept stage and is not considered production-ready. The basic principles have been proven, but there is significant work to be d ...

Category Remote Forensics
GrSecurity
Open Source

Grsecurity is an extensive security enhancement to the Linux kernel that defends against a wide range of security threats through intelligent access control, memory corruption-based exploit prevention, and a host of other system hardening that generally r ...

Category Host IDS
grsecurity
Global Technology Associates, Inc.
Commercial

The GB-2000X Firewall Appliance's powerful hardware design meets the needs of SME corporations with complex Internet connectivity and heavy network traffic demands. GTA's GB-2000X Firewall Appliance provides powerful, enterprise-level security with compre ...

Category VPN Servers
SystemWare Europe Ltd
Commercial

Guardian is a portable RF search system that's small, lightweight and easy to use. State of the art hardware and software are merged to create a detection system easy enough for the most inexperienced security professional to use but powerful enough for t ...

The main aim of the HITBSecConf conference series is to enable the dissemination, discussion and sharing of deep knowledge network security information. Featuring presentations by respected members of both the mainstream network security arena as well as ...

Sans
Commercial

SEC504 helps you develop the skills to conduct incident response investigations. You will learn how to apply a dynamic incident response process to evolving cyber threats, and how to develop threat intelligence to mount effective defense strategies for cl ...

Category Ethical Hacking
Hacker Tools, Techniques, and Incident Handling
Comodo
Commercial

Hacker Guardian PCI Compliance Scanning is designed for Website owners and E-commerce Merchants to secure transactions, in accordance with PCI Standards. HackerGuardian PCI Scanning is a vulnerability assessment scanning solution designed to achieve and ...

HackerGuardian PCI Scanning
HackerTarget.com LLC
Service

HackerTarget.com provides free security scans for websites.  You can purchase a Scan Membership, which then removes the scan limits per day. They provide scans using known, Open Source tools, including: * Nmap Port Scan * Nikto Web Scan * OpenVas ...

TechnoLogismiki
Freeware

Hackman 7 is a freeware hex editor and disassembler. It comes with cryptography capabilities, decoding with ready and self-made algorithms and a fully-featured editor. You can edit virtually any file, disk, ZIP drive, Ram Drive, Smart Media, Compact Flash ...

Category Forensic Tools
Hackman
Arkoon Network Security
Open Source

Hakabana is an open source monitoring tool, which allows users to visiualizes Haka network traffic using Kibana and Elasticsearch. It leverages on the Haka framework to capture packets, dissect them and extract various pieces of information from the ...

Hakabana
Orange Cyberdefense
Commercial

An introductory course for those starting the journey into penetration testing or those working in environments where understanding how hackers think and the tools, tactics and techniques they use. The course presents the background information, technical ...

Category Ethical Hacking
Hands-on Hacking Fundamentals
Tranchulas
Commercial

This training course offers a collection of live demonstrations featuring a variety of hacking and defensive techniques used by hackers. Tranchulas online labs are available 24×7 for practising the techniques and tools demonstrated by our instructor durin ...

Category Ethical Hacking
Hands-On Penetration Testing and Ethical Hacking Training