Top 15 Shell Control Box Alternative and Similar Softwares | Dec 2024

Shell Control Box is a user monitoring appliance that controls privileged access to remote IT systems, records activities in searchable movie-like audit trails, and prevents malicious actions. SCB is a quickly deployable enterprise device, completely independent from clients and servers - integrating seamlessly into existing networks.

1. Varonis

Varonis Varonis (NASDAQ:VRNS) is the foremost innovator and solution provider of comprehensive, actionable data governance software solutions, providing a Metadata Framework™ that enables customers with unstructured and semi-structured data residing on their Files Systems, SharePoint Sites, Exchange servers and NAS devices to audit data access activity, fix and maintain access controls,......

2. LemonLDAP::NG

LemonLDAP::NG LemonlLDAP::NG is a modular Web-SSO based on Apache::Session modules. It simplifies the build of a protected area with a few changes in the application. It manages both authentication and authorization and provides headers for accounting. So you can have a full AAA protection for your web space as described below.......

3. PatrolServer

PatrolServer Welcome to PatrolServer. We scan your server real-time for outdated software and exploits. All delivered by mail and an easy to use dashboard.......

4. Android IMSI-Catcher Detector

Android IMSI-Catcher Detector AIMSICD is an Android app to detect IMSI-Catchers. These devices are false mobile towers (base stations) acting between the target mobile phone(s) and the real towers of service providers. As such they are considered a Man-In-The-Middle (MITM) attack. This surveillance technology is also known as "StingRay", "Cellular Interception" and alike.......

5. KEEP PROTECT

KEEP PROTECT KEEP PROTECT is an automated vulnerabilities and security breaches detection platform for websites and web apps (XSS, SQL injection,etc).......

6. GSMmap

GSMmap The GSM Security Map at gsmmap.org compares the protection capabilities of mobile networks. This app collects data and adds it to GSM Map.This application currently only works on Android 4.1.2 Samsung S2 and S3 devices and requires root priviliges during the mobile network data capture.Note: Custom Android systems like Cyanogenmod......

7. victims

victims The victims project provides a canonical database of known-vulnerable JAR files, along with tools to compare this database to Java applications in development, release and production environments.......

8. 10Duke Indentity Provider

10Duke Indentity Provider 10Duke Identity Provider is an enterprise identity management solution, provides seamless SSO access, supports federated identity, AD, Azure AD, LDAP, social sign-in and others.Popular online services such as Google ID or Facebook Login have changed expectations regarding the ease with which a user expects to be able to access your......

9. Bitium

Bitium Bitium is a provider of cloud-based identity and access management solutions, including single sign-on, password management, and analytics for small, medium and enterprise businesses. Founded in 2012, the company aims to give growing companies the ability to manage access to all of their web-based applications -- including Google Apps and......

10. ApexSQL Audit

ApexSQL Audit ApexSQL Audit can audit all SQL Server activities such as data and objects access and changes, failed logins and security changes. It helps SQL DBAs to meet SQL Server audit compliance requirements by using many built-in audit reports. Use ApexSQL Audit to manage auditing across multiple SQL Server instances from......

11. L0phtCrack

L0phtCrack L0phtCrack is a password auditing and recovery application (now called L0phtCrack 6) originally produced by Mudge from L0pht Heavy Industries. It is used to test password strength and sometimes to recover lost Microsoft Windows passwords, by using dictionary, brute-force, hybrid attacks, and rainbow tables. It was one of the crackers'......

12. Cell Spy Catcher (Anti Spy)

Cell Spy Catcher (Anti Spy) During a Self Learning Process, the App will "learn" all Networks (Cell Towers, Base Stations) that are used by your Phone.After the Self Learning Process - if this App should happen to Detect one of these "Cell Spies", you will be Warned by an Optional Sound and/or an Optional RED......

13. Pyrit

Pyrit Pyrit allows to create massive databases, pre-computing part of the IEEE 802.11 WPA/WPA2-PSK authentication phase in a space-time-tradeoff. Exploiting the computational power of Many-Core- and other platforms through ATI-Stream, Nvidia CUDA, OpenCL and VIA Padlock, it is currently by far the most powerful attack against one of the world’s most......

14. Intruder

Intruder Intruder is a proactive security monitoring platform for internet-facing systems.Cyber threats are ever-changing and require dedicated oversight. Existing services are inadequate, overly complex to configure and operate, and the jargon produced is often confusing, requiring specialist interpretation.Intruder provides a simple cloud based security solution which continually scans your digital assets,......

15. Portadi

Portadi Portadi is a SaaS service that allows workplace teams to manage and control access to cloud apps (such as Zendesk, MailChimp, Salesforce or Twitter). Portadi provides visibility into how often users use apps and allows companies to monitor and control cloud spend. For users, Portadi replaces all passwords and usernames......