RSS 47 projects tagged "BSD Original"

Download Website Updated 14 Mar 2014 Webmin

Screenshot
Pop 1,618.25
Vit 126.49

Webmin is a web-based interface for system administration for Unix. Using any browser that supports tables and forms, you can setup user accounts, internet services, DNS, file sharing and so on.

Download Website Updated 08 Feb 2001 angst

Screenshot
Pop 376.14
Vit 1.74

Angst is an active sniffer, based on libpcap and libnet. It dumps into a file the payload of all the TCP packets received on the specified ports. It implements two methods for active sniffing. Angst is able to monitor ARP requests, and after enabling IP forwarding on the local host, it sends ARP replies mapping all IPs to the local MAC address. Also, it can flood the local network with random MAC addresses (like macof), causing switches to send packets to all ports.

No download Website Updated 02 Apr 2011 BitchX

Screenshot
Pop 307.06
Vit 3.39

BitchX is the premiere IRC (Internet Relay Chat) client. It originally was a modified version of the popular ircII client, and the features were eventually merged into the EPIC IRC client. The current development is aimed at merging the client back to a current branch of EPIC and bringing compatibility and stability back to the client, while bringing the features that are BitchX into a new client.

Download Website Updated 23 Mar 2008 Issue Dealer

Screenshot
Pop 254.53
Vit 16.89

The Issue Dealer is a simple product for managing (structuring, editing, prioritizing, categorizing) issues. It is primarily used to manage information and tasks. It can be used as an issue tracker, knowledge management tool, or outliner.

Download Website Updated 21 Oct 2013 popa3d

Screenshot
Pop 196.66
Vit 23.64

popa3d is a POP3 daemon which attempts to be extremely secure, reliable, RFC compliant, and fast (in that order).

Download Website Updated 26 Jul 2009 NetBSD

Screenshot
Pop 161.69
Vit 7.19

NetBSD is a free, secure, and highly portable Unix-like operating system available for many platforms, from large-scale server systems to powerful desktop systems to handheld and embedded devices. Its clean design and advanced features make it excellent in both production and research environments, and the source code is freely available under a business-friendly license. NetBSD is developed and supported by a large and vivid international community. Many applications are easily available through pkgsrc, the NetBSD Packages Collection.

Download Website Updated 29 May 2007 honeyd

Screenshot
Pop 147.73
Vit 5.44

Honeyd is a small daemon that creates virtual hosts on a network. The hosts can be configured to run arbitrary services, and their TCP personality can be adapted so that they appear to be running certain versions of operating systems. Honeyd enables a single host to claim multiple addresses on a LAN for network simulation. It is possible to ping the virtual machines, or to traceroute them. Any type of service on the virtual machine can be simulated according to a simple configuration file. Instead of simulating a service, it is also possible to proxy it to another machine.

Download Website Updated 22 Oct 2013 scanlogd

Screenshot
Pop 140.89
Vit 11.78

scanlogd is a system daemon which attempts to log all portscans of a host to the syslog, in a secure fashion.

Download Website Updated 24 Jun 2004 Isoqlog

Screenshot
Pop 140.22
Vit 4.05

Isoqlog is an MTA log analysis program written in C. It is designed to scan qmail, Postfix, Sendmail, and Exim logfiles and produce usage statistics in HTML for viewing through a browser. It produces a "top domains" statistic according to sender, receiver, total mails, and bytes, and keeps the main domain mail statistics with regard to day's top domain, and top users values for per day, per month, and per year.

Download Website Updated 06 Sep 2004 stegdetect

Screenshot
Pop 137.50
Vit 1.00

Stegdetect is an automated tool for detecting steganographic content in images. It is capable of detecting several different steganographic methods to embed hidden information in JPEG images. Currently, the detectable schemes are jsteg, jphide, invisible secrets, outguess 01.3b, F5, appendX, and camouflage. Using linear discriminant analysis, it also supports detection of new stego systems. Stegbreak is used to launch dictionary attacks against JSteg-Shell, JPHide, and OutGuess 0.13b.

Screenshot

Project Spotlight

filterunit

A unit test facility for command line programs with file input and output.

Screenshot

Project Spotlight

reposurgeon

A tool for editing version control repository history.