Netscape Security Wrapper manages the loading of NPAPI (Netscape Plugin API) plugins and applies simple policy decisions. The intention is to allow administrators to deploy deprecated, unreliable, or unsafe third party plugins while minimizing the security exposure. Safari, Google Chrome, Firefox, and other NPAPI-compatible browsers are supported on OS X and Linux. Use cases include: restricting plugins to certain domains, restricting the use of deprecated plugins to known outliers, allowing internal corporate workflows which use insecure or deprecated plugins without exposing the plugin to the hostile Internet, and allowing multiple outdated plugin versions (e.g., Java) to co-exist for use in whitelisted, trusted enterprise tools.
skipfish is a high-performance, easy, and sophisticated Web application security testing tool. It features a single-threaded multiplexing HTTP stack, heuristic detection of obscure Web frameworks, and advanced, differential security checks capable of detecting blind injection vulnerabilities, stored XSS, and so forth.
ratproxy is a semi-automated, largely passive Web application security audit tool optimized for accurate and sensitive detection, and automatic annotation, of potential problems and security-relevant design patterns based on the observation of existing, user-initiated traffic in complex Web 2.0 environments.
tmin is a quick and simple tool to minimize the size and syntax of complex test cases in automated security testing. It is meant specifically for dealing with unknown or complex data formats (without the need to tokenize and re-serialize testcases), and for easy integration with UI testing harnesses.
Bunny the Fuzzer is a closed loop, high-performance, general purpose protocol-blind fuzzer for C programs. It uses compiler-level integration to seamlessly inject precise and reliable instrumentation hooks into the traced program. These hooks enable the fuzzer to receive real-time feedback on changes to the function call path, call parameters, and return values in response to variations in input data.
mod_sesehe is an Apache module that disguises and removes the "Server: " HTTP header from responses. This allows you to hide certain information about the server. This also allows more accurate information to be provided if Apache is configured as a reverse proxy and a malformed request is received. Although sending the Server header in HTTP responses is not defined as a MUST in RFC 2616, the Apache HTTP Server does not otherwise allow you to disable sending this header via its configuration.
The Enterprise Sign On Engine (ESOE) allows an enterprise to meet its goals for identity management, single sign on, authorization, federation, and accountability for resource access in a very extensible manner. The ESOE is built using the OASIS SAML 2.0 specification, and the ESOE's powerful authorization engine is built around a reduced version of the OASIS XACML 2.0 standard called Lightweight eXtensible Authorization Control Markup Language or "LXACML".
The Secure Storage service for the gLite middleware provides users with a set of tools for storing data securely and in an encrypted format on the grid storage elements. Data is accessible and readable by authorized users only. Moreover, it solves the insider abuse problem by also preventing administrators of the storage elements from accessing the confidential data in a clear format. The service has been designed and developed for the grid middleware of the EGEE Project, gLite, in the context of the TriGrid VL Project.
Auth MemCookie is an Apache v2 authentication and authorization module based on a cookie authentication mechanism. The module doesn't do authentication by itself, but verifies if the cookie used for authentication is valid for each URL protected by the module. The module also validates whether the authenticated user has authorization to access the URL. Authentication is done externally through an authentication form page, and all authentication information necessary to the module is a stored in memcached.