WehnTrust

  •        0

WehnTrust is a Host-based Intrusion Prevention System (HIPS) for Windows 2000, XP, and Server 2003. It includes support for exploit mitigations that are designed to make exploitation more difficult by preventing the use of specific exploitation techniques and by making exploi...

http://wehntrust.codeplex.com/

Tags
Implementation
License
Platform

   




Related Projects

csp-evaluator


Please note: this is not an official Google product.CSP Evaluator allows developers and security experts to check if a Content Security Policy (CSP) serves as a strong mitigation against cross-site scripting attacks. It assists with the process of reviewing CSP policies, and helps identify subtle CSP bypasses which undermine the value of a policy. CSP Evaluator checks are based on a large-scale study and are aimed to help developers to harden their CSP and improve the security of their applications. This tool (also available as a Chrome extension) is provided only for the convenience of developers and Google provides no guarantees or warranties for this tool.

rex - Rex provides a variety of classes useful for security testing and exploit development.


Rex provides a variety of classes useful for security testing and exploit development.

GameOver


Training and educating about the web security

ASLR-tester - Program to test ASLR (Addess Space Layout Randomization) of the Linux Kernel


Program to test ASLR (Addess Space Layout Randomization) of the Linux Kernel

w3af - Web Application Attack and Audit Framework


w3af is a Web Application Attack and Audit Framework. The project’s goal is to create a framework to help you secure your web applications by finding and exploiting all web application vulnerabilities. It can find Cross site scripting, SQL Injection and lot more. The framework implements web and proxy servers which are easy to integrate into your code in order to identify and exploit vulnerabilities.

OpSec-Firefox-Addon-Exploit-Suite


OpSec Firefox Addon Exploit Suite is a POC application that demonstrate various flaws in the Firefox Add-on Security Model.

mitigation - Package mitigation provides the possibility to prevent system damage.


Package mitigation provides the possibility to prevent system damage.

Sholo.Web.Security


Sholo.Web.Security contains several tools to improve the security of ASP.NET applications. Make FormsAuthentication stateful, strengthen FormsAuthTicket validation, detect & prevent Padding Oracle exploit, kick/ban users & IP's, detect multiple logins from different IP's, etc.

stripe-ctf-2-vm - The Stripe Capture the Flag (CTF) 2 contest in a Virtualbox VM.


This repository provides the 2012 Stripe CTF 2.0 contest in the form of a Virtualbox VM, generated with Packer, suitable for conducting group exercises with a minimum of technical preparation.The Capture the Flag (CTF) contest is an exercise for developers at all levels of experience, designed as a teaching aid to cover some of the basics of web security. There are nine puzzles in the contest, each with its own set of code to inspect and server to exploit, the first being the easiest and the last the hardest. To progress to the next puzzle you extract a password by finding and exploiting the security flaws in the current puzzle.

Choosing-the-appropriate-dress-for-your-body-shape


Like most women, if you have dreamed about your wedding day since you are a little girl, choosing your wedding dress may not be a simple thing. Today's bride has a plenty of gown options available to her, including A-line, sheath, mermaid, empire and ball gown silhouettes. Though fitting sessions are the only way to tell you what works best for you, the following body shape tips are meant to help you. Hourglass: In this shape, bust and hip are significantly large with narrow waist resembling t

kextstat_aslr - Implementation of kexstat via /dev/kmem with kernel ASLR support


Implementation of kexstat via /dev/kmem with kernel ASLR support

aslrtest - Some programs to test ASLR


Some programs to test ASLR

Synsnoop - SYNSNOOP: A TCP SYN Flood Attack Detection and Mitigation Mechanism in Linux Kernel 2.6


SYNSNOOP: A TCP SYN Flood Attack Detection and Mitigation Mechanism in Linux Kernel 2.6

defense - misc small network defense and attack mitigation scripts


misc small network defense and attack mitigation scripts

django-debreach - BREACH mitigation for Django apps.


BREACH mitigation for Django apps.

CSRF-Play - Cross-site request forgery attack mitigation in Play!


Cross-site request forgery attack mitigation in Play!

ActiveTankValues - Active Mitigation Tracker for Tanks


Active Mitigation Tracker for Tanks

mitigator - General channel mitigation library


General channel mitigation library

synsanity - netfilter (iptables) target for high performance lockless SYN cookies for SYN flood mitigation


synsanity is a netfilter (iptables) target for high performance lockless SYN cookies for SYN flood mitigation, as used in production at GitHub.synsanity allows Linux servers running 3.x kernels to handle SYN floods with minimal (or at least less) performance impact. With default Linux kernel 3.x settings, a very small SYN flood causes complete CPU exhaustion as the kernel spinlocks on the LISTEN socket and in conntrack. synsanity moves much of this work into a netfilter (iptables) target and bypasses locks for this attack scenario, allowing high throughput syncookie generation before the packets hit the TCP stack.