RSS 6 projects tagged "Cryptography"

No download Website Updated 23 Aug 2010 Ganymed SSH-2 for Java

Screenshot
Pop 78.51
Vit 4.09

Ganymed SSH-2 for Java is a library that implements the SSH-2 protocol in pure Java (tested on J2SE 1.4.2, 5, and 6). It allows one to connect to SSH servers from within Java programs. It supports SSH sessions (remote command execution and shell access), local and remote port forwarding, local stream forwarding, X11 forwarding, SCP, and SFTP. There are no dependencies on any JCE provider, as all cryptographic functionality is included.

Download Website Updated 17 Nov 2008 yaSSH

Screenshot
Pop 70.40
Vit 2.07

The yaSSH software package is a fast, dual-licensed implementation of SSH. It will include an SSH client, a client library, a server, and a server library. It is focused on speed, limited memory requirements, a simple API, portability, and use in an embedded setting.

No download Website Updated 29 May 2004 Reverse Remote Shell

Screenshot
Pop 92.75
Vit 2.01

rrs is a reverse (connecting) remote shell. Instead of listening, it will connect out to rrs in listen mode. The listener will accept the connection and receive a shell from the remote host. rrs features full pseudo-TTY support, full OpenSSL support (client/server authentication and choice of cipher suites), Twofish encryption, a simple XOR cipher, plain-text sessions, peer-side session snooping, a daemon option, and reconnection features. It is known to compile and run under Linux, FreeBSD, NetBSD, OpenBSD, and QNX.

Download Website Updated 05 Dec 2004 Hardened Debian

Screenshot
Pop 69.00
Vit 1.75

Hardened Debian improves Debian GNU/Linux with high security and hardening features, hardened kernels and packages, DHKP, and other security related enhancements. It makes systems more difficult to compromise using common attacks such as race conditions, chroot jail escapes, and buffer overflows.

No download Website Updated 20 Nov 2002 guard bash

Screenshot
Pop 22.27
Vit 1.00

guard bash is a shell wrapper that will execute an authentication phase before any command is executed. It uses a secret (user owned) algorithm method, and has a per user customizable procedure. If you need to connect to your computer from outside of your safe environment, even if you use SSH, you are vulnerable to simple attacks like key sniffing or to more complex attacks against SSH. If you have more than just one authentication method, you can more safely log in your account from an insecure Internet host.

Download Website Updated 25 Mar 2008 ansistego

Screenshot
Pop 29.92
Vit 1.00

ansistego provides terminal-level steganography for scripts and other ASCII files (ie, protection against 'cat'). It intersperses a text/script with commented ANSI codes that cause most terminals to clear sensitive lines as soon as they are written. Only a specified front text appears. The front text is embedded in the script using ANSI-cloaked comments, so that the text appears unaltered when the script is viewed with cat, but the script can be run without any decoding stage.

Screenshot

Project Spotlight

iBoostUp

A system optimization tool.

Screenshot

Project Spotlight

Aspose.Words for .NET

A word processing component for .NET applications.