RSS 18 projects tagged "Cryptography"

No download Website Updated 13 Mar 2006 Trustix™ Enterprise Firewall

Screenshot
Pop 31.30
Vit 54.37

Trustix™ Enterprise Firewall is a WYSIWYG firewall for iptables. It provides drag and drop security policy deployment and allows you to visualise DMZs, integrate branch offices with 3DES encrypted VPN tunnels, accelerate Internet access times with proxy caching server, and authenticate remote workers with PKI X.509 certificates. The unique GUI also allows you to manage traffic for all your zones (up to 24) as well as port forwarding and network address translation (NAT).

No download Website Updated 11 Feb 2014 Zorp

Screenshot
Pop 310.06
Vit 32.57

Zorp is a proxy firewall suite with its core architecture is built around today's security demands: it uses application level proxies, is modular and component based, uses a script language to describe policy decisions, makes it possible to monitor encrypted traffic, lets you override client actions, and lets you protect your servers with its built in IDS capabilities.

Download No website Updated 16 Feb 2014 ipt_pkd

Screenshot
Pop 428.55
Vit 25.26

ipt_pkd is an iptables extension implementing port knock detection with SPA (single packet authorization). This project provides 3 parts: the kernel module ipt_pkd, the iptables user space module libipt_pkd.so, and a user space client knock program. For the knock packet, it uses a UDP packet sent to a random port that contains a SHA-256 of a timestamp, small header, random bytes, and a shared key. ipt_pkd checks the time window of the packet and does the SHA-256 to verify the packet. The shared key is never sent.

Download Website Updated 02 Apr 2010 DeleGate

Screenshot
Pop 349.73
Vit 16.18

DeleGate is a multi-purpose application level gateway or proxy server that mediates communication of various protocols, applying cache and conversion for mediated data, controlling access from clients, and routing toward servers. It translates protocols between clients and servers, converting between IPv4 and IPv6, applying SSL (TLS) to arbitrary protocols, merging several servers into a single server view with aliasing and filtering. It can be used as a simple origin server for some protocols (HTTP, FTP, and NNTP).

Download Website Updated 11 Dec 2009 OpenVPN

Screenshot
Pop 386.17
Vit 7.07

OpenVPN is a robust and highly configurable VPN (Virtual Private Network) daemon which can be used to securely link two or more private networks using an encrypted tunnel over the Internet. OpenVPN's principal strengths include wide cross-platform portability, excellent stability, support for dynamic IP addresses and NAT, adaptive link compression, single TCP/UDP port usage, a modular design that offloads most crypto tasks to the OpenSSL library, and relatively easy installation that in most cases doesn't require a special kernel module.

Download Website Updated 09 Oct 2012 eurephia

Screenshot
Pop 104.16
Vit 6.02

eurephia is an authentication plug-in for OpenVPN. It enhances the OpenVPN authentication process by using user name and password authentication in addition to SSL certificates. If too many failed attempts are registered, the user account and/or IP address will be blocked. For Linux servers, iptables support is also included, which can be used to restrict each user's network access through the VPN channel. OpenVPN 2.2 or later is required.

Download Website Updated 16 Feb 2012 vpnd

Screenshot
Pop 88.17
Vit 5.14

vpnd is a daemon which connects two networks on network level either via TCP/IP or a (virtual) leased line attached to a serial interface. All data transfered between the two networks are encrypted using the unpatented free Blowfish encryption algorithm with a key length of up to 576 bits (may be downgraded to a minimum of 0 bits to suit any legal restrictions).

Download Website Updated 22 May 2005 TrinityOS

Screenshot
Pop 381.95
Vit 4.48

TrinityOS is a step-by-step, example-driven HOWTO on building a very functional Linux box with strong security in mind. TrinityOS is well known for its strong packet firewall ruleset, Chrooted and Split DNS (v9 and v8), secured Sendmail (8.x), Linux PPTP, Serial consoles and Reverse TELNET, DHCPd, SSHd, UPSes, system performance tuning, the automated TrinityOS-Security implementation scripts, and much more.

Download Website Updated 29 Dec 2008 IKEv2

Screenshot
Pop 36.85
Vit 3.61

IKEv2 is an implementation of the Internet Key Exchange protocol version 2. It is still in development, and currently targeted/developed on Fedora Core 5. Other Unix-like operating system are left for a later stage of development.

Download Website Updated 04 Aug 2004 CIPE

Screenshot
Pop 201.16
Vit 3.10

CIPE (Crypto IP Encapsulation) is an ongoing project to build encrypting IP routers. The protocol used is as lightweight as possible. It is designed for passing encrypted packets between prearranged routers in the form of UDP packets. This is not as flexible as IPSEC but it is enough for the original intended purpose: securely connecting subnets over an insecure transit network.

Screenshot

Project Spotlight

Octopussy

A Perl/XML log analyzer, alerter, and reporter.

Screenshot

Project Spotlight

Chaotic Rage

A multiplatform 3D zombie shooter.