PolarSSL is a light-weight cryptographic and SSL/TLS library written in C. PolarSSL makes it easy for developers to include cryptographic and SSL/TLS capabilities in their (embedded) applications with as little hassle as possible. Loose coupling of the components inside the library means that it is easy to separate the parts that are needed, without needing to include the total library. PolarSSL is written with embedded systems in mind and has been ported on a number of architectures, including ARM, PowerPC, MIPS, and Motorola 68000. The source is written to have very loose coupling, enabling easy integration of parts in other software projects. Very loosely coupled cryptographic algorithms for MD2, MD4, MD5, SHA1, SHA-256, SHA-512, AES, Camellia, DES, Triple DES, ARC3, and RSA are included.
NetCrack is cluster software developed to distribute a hashing algorithm's cracking process work using a brute force attack. Currently, it only supports the two most commonly used hashing algorithms: MD5 and SHA-1. Support is included for MySQL, safe mode, and others. It works like a client/server application, where the server is unique for each cluster network and its job is to distribute the cracking process work, coordinate the nodes, and prevent connections and data integrity errors.
CACKey provides a standard interface (PKCS#11) for smartcards connected to a PC/SC compliant reader. It performs a similar function to "CoolKey", but only supports Government Smartcards. It supports all Government Smartcards that implement the Government Smartcard Interoperability Specification (GSC-IS) v2.1 or newer.
sphlib provides optimized implementations in both C and Java of cryptographic hash functions. The C code includes "small footprint" variants optimized for architectures with low L1 cache (e.g. WiFi routers running OpenWRT). The C code comes with a command-line tool that can serve as a drop-in replacement for md5sum, sha1sum, sha256sum, etc. for all implemented hash functions. The Java code is compatible with J2ME. There are implementations of fourteen "second-round" SHA-3 candidates, for all output lengths: BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Grøstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein. Some pre-SHA-3 hash functions (including MD4, MD5, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-160, and others) are also implemented.
Caume Data Security Engine is a REST API platform for storing and processing files in uncontrolled environments. It provides a Free Software solution which allows the creation of reasonably secure and isolated workspaces to process and store sensitive data within uncontrolled environments. With concepts such as "the cloud" and "bring your own device", as well as an increasing demand for mobile devices, it has become clear that the way in which companies operate is changing dramatically, and, with it, the way in which we secure information and the infrastructure which supports business processes. CaumeDSE has been designed as a service platform which provides security to data by using free, well-known, and robust cryptographic software, as well as open and simple data structures and interfaces to make portability and extensibility easy.
SSLsplit is a tool that performs man-in-the-middle attacks against SSL/TLS encrypted network connections for network forensics and penetration testing. It terminates SSL/TLS and initiates a new connection to the original destination, logging all data transmitted. It supports plain TCP and SSL, HTTP and HTTPS, and IPv4 and IPv6. For SSL and HTTPS, it generates and signs forged X509v3 certificates on-the-fly using the original certificate's subject DN and subjectAltName extension. It supports Server Name Indication, RSA, DSA, and ECDSA keys, and DHE and ECDHE cipher suites. It can also use existing certificates if the private key is available.