Software Listing: Attack Surface Analyzer
- Attack Surface Analyzer
- License: Shareware

The Attack Surface Analyzer application is similar to the same tool used by Microsoft's internal product teams to catalogue changes made to the operating system by the installation of new software.
Attack Surface Analyzer takes a snapshot of your system state before and after the installation of product(s) and displays the changes to a number of key elements of the Windows attack surface.
This allows:
- Developers to view changes in the attack surface resulting from the introduction of their code on to the Windows platform
- IT Professionals to assess the aggregate Attack Surface change by the installation of an organization's line of business applications
- IT Security Auditors evaluate the risk of a particular piece of software installed on the Windows platform during threat risk reviews
- IT...
- Publisher: Microsoft
- Date:
- Platform: Win7 x64, Windows 7, WinServer, WinVista, WinVista x64
- Secure-It
- License: Freeware
- Price: 0.00

Secure-It is a local Windows security hardening tool, proactively secure your PC by either disabling the intrusion and propagation vectors proactively or simply reduce the attack surface by disabling unimportant functions. It secures Windows desktop PCs and Internet servers against new dangers by blocking the root cause of the vulnerabilities exploited by malware, worms and spy ware . In some cases Secure-it is even able to protect your PC against threats prior to a patch release of the vendor. * Harden your Local Zone Security (My Computer) settings. * Proactively disable scripting or Active-X controls which proved potential propagation vectors in the past.
- Publisher: YASC LTD
- Date: 18-02-2005
- Size: 712 KB
- Platform: Win2000, Windows Server, WinOther
- HTTP Anti Flood/DoS Security Module
- License: Freeware
- Price: 0.00

This module provides attack surface reduction enhancements against the HTTP Flood Attacks at the web application level. Massive crawling/scanning tools, HTTP Flood tools can be detected and blocked by this module via htaccess, firewall or iptables, etc. (like mod_evasive)
You can use this module by including "iosec.php" to any PHP file which wants to be protected.
You can test module here: http://www.iosec.org/test.php (demo)
Watch the Proof of Concept video: http://goo.gl/dSiAL
Read the Hakin9 IT Security Magazine Article about IOSEC http://goo.gl/1dcA9 (and http://goo.
- Publisher: Iosec
- Date:
- Size: 196 KB
- Platform: Linux, Mac OS X, WinOther
- IIS Lockdown Tool
- License: Shareware

IIS Lockdown Wizard works by turning off unnecessary features, thus reducing attack surface available to attackers. To provide multiple layers of protection against attackers, URLscan, with customized templates for each supported server role, is integrated into the IIS Lockdown Wizard.
To keep the server completely secure, however, all hotfixes are required before and after applying IIS Lockdown Wizard to stay protected against known security vulnerabilities.
Get IIS Lockdown Tool and try it for yourself to see what it can actually do for you!
.
- Publisher: Microsoft
- Date:
- Platform: Win2000, Windows 7, WinOther, WinVista
Security Configuration Wizard (SCW) is an attack surface reduction tool introduced with Windows Server 2003 Service Pack 1. SCW uses a roles-based metaphor to solicit the functionality required for a server and disables the functionality that is not required.
By automating this security best practice, SCW diversifies the Windows landscape creating Windows environments that are less susceptible, on the whole, to security vulnerabilities that have been exploited.
Security Configuration Wizard Manifest for Microsoft Windows SharePoint Services is designed to provide the Roles for SharePoint Services 3.
- Publisher: Microsoft
- Date:
- Platform: WinOther, WinServer, WinVista
- Windows Server 2008 Security Configuration Wizard and SC Configuration Manager 2007 SP1
- License: Shareware

The Security Configuration Wizard (SCW) is an attack-surface reduction tool for the Microsoft Windows Server 2008 operating system. SCW determines the minimum functionality required for a server's role or roles, and disables functionality that is not required.
The Configuration Manager 2007 SP1 Windows Server 2008 SCW template supports both new and updated site system definitions and the required services and ports.
Get the Windows Server 2008 Security Configuration Wizard and SC Configuration Manager 2007 SP1 template and try it for yourself to see what it's all about!
.
- Publisher: Microsoft
- Date:
- Platform: Windows Server
- Microsoft Threat Analysis and Modeling
- License: Shareware

Microsoft Threat Analysis & Modeling tool allows non-security subject matter experts to enter already known information including business requirements and application architecture which is then used to produce a feature-rich threat model. Along with automatically identifying threats, the tool can produce valuable security artifacts such as:
- Data access control matrix
- Component access control matrix
- Subject-object matrix
- Data Flow
- Call Flow
- Trust Flow
- Attack Surface
- Focused reports
Instructions :
1. Download the file by clicking on the "Download" button.
- Publisher: Microsoft Corporation.
- Date:
- Size: 10219 KB
- Platform: Windows 7, WinOther, WinVista
- Microsoft IIS Lockdown Tool
- License: Freeware
- Price: -

Microsoft IIS Lockdown Tool lets you instantly configure an IIS 4.0 or 5.0 Web server for secure operation Microsoft IIS Lockdown Tool will provide you the means to instantly configure an IIS 4.0 or 5.0 Web server for secure operation. IIS Lockdown Wizard works by turning off unnecessary features, thus reducing attack surface available to attackers. To provide multiple layers of protection against attackers, URLscan, with customized templates for each supported server role, is integrated into the IIS Lockdown Wizard. To keep the server completely secure, however, all hotfixes are required before and after applying IIS Lockdown Wizard to stay protected against known security vulnerabilities.
- Publisher: download.microsoft.com
- Date: 26-10-2009
- Size: 284 KB
- Platform: Win2000, WinOther
- Burp Suite
- License: Shareware
- Price: 299.00

Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application's attack surface, through to finding and exploiting security vulnerabilities. Burp gives you full control, letting you combine advanced manual techniques with state-of-the-art automation, to make your work faster, more effective, and more fun. Burp Suite contains the following key components: An intercepting proxy, which lets you inspect and modify traffic between your browser and the target application.
- Publisher: PortSwigger Ltd.
- Date: 15-06-2012
- Size: 2867 KB
- Platform: WinOther
- Orange JeOS
- License: Freeware
- Price: 0.00

Orange JeOS ("juice") is a small and secure Linux distribution, based on CentOS and designed for use by hardware, software and virtual appliance builders.
OJ-Builder Tools are used to build an Orange JeOS ISO entirely from public CentOS repository.
Orange JeOS leverages the CentOS Linux distribution and allows building fully functioning software (and hardware and virtual) appliances in as little as 200 MB.
CentOS Based, Builds an Installable image or VM with application RPM files, Security through attack surface limitation and service lockdown
Orange JeOS License - GNU General Public License version 2.
- Publisher: Orangejeos
- Date:
- Platform: WinOther
- Security Compliance Management Toolkit Series
- License: Freeware
- Price: 0.00

Monitor the Security Compliance of Your IT Environment for Computers Running Windows
The Security Compliance Management Toolkit Series builds on previous Solution Accelerators to provide you with expanded best practices and additional automation tools to help configure and deploy security settings for the following operating systems and applications: WindowsdlT* 7, BitLockerd-OC?D? Drive Encryption, WindowsdlT* Internet ExplorerdlT* 8, Windows ServerdlT* 2008, Windows ServerdlT* 2003 Service Pack 2 (SP2), Windows VistadlT* SP1, Windows XPdlT* Professional SP3, and 2007 Microsoft Office SP1.
- Publisher: Microsoft Coporation
- Date:
- Size: 11581 KB
- Platform: Win2000, Windows 7, WinOther, WinServer, WinVista
- System Center Operations Manager 2007 R2 SCW Roles and Security Hardening Guide for Windows Server 2008
- License: Freeware
- Price: 0.00

The Operations Manager 2007 Security Configuration Wizard (SCW) Roles and Security Hardening guide can be used to help further protect and harden your Operations Manager 2007 R2 environment in conjunction with the SCW on Windows Server 2008 by closing or disabling unnecessary ports and services reducing the overall attack surface.
Feature Bullet Summary:
The Operations Manager 2007 SCW Roles contain hardening definitions for:
* System Center Operations Manager 2007 Management Server
* System Center Operations Manager 2007 Root Management Server
* System Center Operations Manager 2007 Agent
It also contains additional hardening option for:
* System Center Operations Manager 2007 Audit Collector
* System Center Operations Manager 2007 Audit Forwarder
* System Center...
- Publisher: Microsoft
- Date:
- Size: 61 KB
- Platform: WinServer
- Hyper-V Security Guide
- License: Freeware
- Price: 0.00

This Solution Accelerator provides instructions and recommendations to help strengthen the security of computers running the Hyper-V role on Windows ServerdlT* 2008. It covers three core topics: hardening Hyper-V, delegating virtual machine management, and protecting virtual machines.
This Solution Accelerator consists of a security guide and an overview packaged in a .zip file format. The security guide is a Word document intended for IT and security professionals. It includes three chapters that discuss methods and best practices that will help to secure a Hyper-V environment. The overview is a two page description of the security guide and other virtualization Solution Accelerators that are available.
- Publisher: Microsoft Corporation.
- Date:
- Size: 1034 KB
- Platform: WinOther, WinVista
- ANALYZER for RECOVER Fixed/Floppy Disk
- License: Freeware
- Price: 0.00

ANALYZER for RECOVER Fixed/Floppy Disk V0.3 FREEWARE visually reports on bad sectors in system area of floppy disk. You can check if Boot Sector, FAT 1, FAT 2, and ROOT FOLDER sectors are good or bad. You find how much of remaining file system can help recover files when you use RECOVER Fixed/Floppy Disk. While RECOVER Fixed/Floppy Disk (RFD) brings simplicity into data recovery, ANALYZER for RECOVER Fixed/Floppy Disk V0.3 gives a head start to using RFD. When Boot Sector on floppy is bad, WINDOWS 98SE displays a window with this error message: The disk in drive A: is not formatted: Do you want to format it now? When 1st FAT sector on floppy is bad, WINDOWS 98SE displays the same error message for reasons known to itself.
- Publisher: Systech Software
- Date: 08-03-2005
- Size: 16 KB
- Platform: MS-DOS, Win2000, WinOther
- Surface Defects Analyzer
- License: Freeware
- Price: 0.00

Surface Defects Analyzer is the project of control system implementation which is used for detecting and measurement of geometric parameters of surface defects based on stereo images processing..
- Publisher: defectsanalyzer.sourceforge.net
- Date: 13-11-2012
- Size: 1954 KB
- Platform: WinOther
- Land Surface Temperature Analyzer
- License: Freeware
- Price: 0.00

On December 8, 2009 the UK Met Office released records of worldwide land surface temperature readings. This project analyzes these records and produces output files that can be read by gnuplot and Google Earth to show temperature trends.
Land Surface Temperature Analyzer License - GNU General Public License (GPL).
- Publisher: Landsurfacetemp
- Date:
- Platform: WinOther
- SoftPerfect Network Protocol Analyzer d-deOCt Network sniffer
- License: Shareware

SoftPerfect Network Protocol Analyzer is an advanced, professional tool for analyzing, debugging, maintaining and monitoring local networks and Internet connections. It captures the data passing through your dial-up connection or network Ethernet card, analyzes this data and then represents it in an easily readable form. SoftPerfect Network Protocol Analyzer is a useful tool for network administrators, security specialists, network application developers and anyone who needs a comprehensive picture of the traffic passing through their network connection or segment of a local area network.
SoftPerfect Network Protocol Analyzer presents the results of its network analysis in a convenient and easily understandable format.
- Publisher: SoftPerfect Research
- Date:
- Size: 1955 KB
- Platform: Win2000, Windows 7, WinOther, WinServer, WinVista
- Underground Attack
- License: Shareware
- Price: 0.99

Our World is under attack.
Goblin from the center of the Earth are tempting to invade our world, coming back up to the surface.
You are the Green Surfer and you are the last chance of Mankind.
But the fight is not easy Goblins use stones to protect themselves from your green energy balls.
So only your strategy will enable you to win.
You select your shoot direction with your thumb on the left side of the Green Surfer.
You can see the Goblins positions dragging the screen with your finger on the right side of the Green Surfer.
- Publisher: choulet
- Date:
- Size: 7168 KB
- Platform: Windows Phone, WinMobile
- AlterWind Log Analyzer
- License: Shareware
- Price: 75

AlterWind Log Analyzer is a powerful web site traffic analysis software. It quickly generates traditional and some additional reports for your web site log files.This loganalyzer has a number of additional features. The program has easy-to-use interface. AlterWind Log Analyzer supports different log files format. Besides you also can specify your own log file format..
- Publisher: AlterWind Software
- Date: 30-05-2003
- Size: 1044 KB
- Platform: WinOther
- OscilloMeter - Spectrum Analyzer
- License: Shareware
- Price: 399

Oscillometer is intended for real-time investigation of data accepted from sound card or other ADC you will want. Oscillometer consists of an oscilloscope and FFT spectrum analyzer. Maximum numbers of channels, sampling frequency, bit rate of data, frequencies range, precision are limited only by type of used ADC. The obtained data and images can be saved to files or clipboard. Oscilloscope modes (for dual-channel ADC): original signals, sum, difference, dependence of one channel on another, amplitude distribution of input signals. The synchronization is independent in each of panel. Spectral analyzer works on algorithm of Fast Fourier transform (FFT).
- Publisher: Oleg Ya. Shmelyoff
- Date: 23-06-2004
- Size: 448 KB
- Platform: Win2000, WinOther













