====== Security Assessment Tools ====== * [[http://www.arhont.com/en/category/resources/tools-utilities/|Arhont - Cisco pen tools]] * [[http://www.yersinia.net/download.htm|Yersinia - Network pen tools]] * [[http://technet.microsoft.com/en-us/sysinternals/bb963902.aspx|Autoruns for Windows]] * [[http://www.mandiant.com/products/research|Mandiant forensic tools]] * [[http://www.nsrl.nist.gov/|National Software Reference Library]] * [[http://sourceforge.net/projects/sentrytools/|Sentry Tools]] * [[http://torrentspy.sourceforge.net/index.shtml#purpose|TorrentSpy]] * [[http://www.shadowserver.org/wiki/pmwiki.php/Shadowserver/Shadowserver|Shadow Server]] - Watchdog group ===== Guides ===== * [[http://www.symantec.com/connect/articles/exploiting-cisco-routers-part-1|Exploiting Cisco Routers]] * [[http://www.enterprisenetworkingplanet.com/netsecur/article.php/3462211/Configure-Your-Catalyst-for-a-More-Secure-Layer-2.htm|Cisco layer 2 security]] -- Main.FredPettis - 2011-02-09