RSS 56 projects tagged "Linux"

Download Website Updated 28 Feb 2008 BlueProximity

Screenshot
Pop 81.33
Vit 2.94

BlueProximity helps add a little more security to the desktop. It does so by detecting a certain Bluetooth device, most likely a mobile phone, and keeping track of its distance. If it is moved away from the computer and the distance is above a certain level (no measurement in meters is possible) for a given time, it automatically locks the desktop (or starts any other shell command wanted). Once away, the computer awaits its master's return: if the device is nearer than a given level for a set time, the computer unlocks without any interaction (or starts any other shell command wanted).

Download Website Updated 02 Nov 2013 Bluelog

Screenshot
Pop 160.95
Vit 9.54

Bluelog is a Bluetooth site survey tool, designed to tell you how many discoverable devices there are in an area as quickly as possible. Bluelog differs from most Bluetooth scanners in that it prioritizes speed of reporting over anything else (i.e. it doesn't spend time trying to pull detailed data from a device) and doesn't require any user intervention to function. As the name implies, its primary function is to log discovered devices to file rather than to be used interactively. Bluelog could run on a system unattended for long periods of time to collect data. In addition to basic scanning, Bluelog also has a unique feature called "Bluelog Live", which puts results in a constantly updating Web page which you can serve with your HTTP daemon of choice.

Download No website Updated 21 Apr 2009 Bukowski Framework

Screenshot
Pop 17.32
Vit 1.41

Bukowski Framework is intended to demonstrate that current popular approaches to software security (e.g. DAC, VMA randomization, anti-virus, NIDS, etc.) are not sufficient and that other approaches should be considered more seriously (e.g. MAC, design by contract, mutual authentication/authorization, etc.).

Download Website Updated 30 Jun 2008 Certmaster

Screenshot
Pop 31.75
Vit 1.45

Certmaster is a set of command line tools and a Python library for easily distributing SSL certificates to applications that need them via XML-RPC.

Download Website Updated 09 Apr 2009 Console Password Manager

Screenshot
Pop 190.18
Vit 5.17

cpm (Console Password Manager) is a small console tool to manage passwords and other sensitive data and store them in a public-key encrypted file. It also allows you to configure the whole hierarchy yourself, so it's easily adoptable for many requirements. The encryption is handled through GnuPG, and the data inside is stored as XML.

Download Website Updated 21 May 2008 Covert Channels Evaluation Framework

Screenshot
Pop 17.49
Vit 1.00

CCHEF (Covert Channels Evaluation Framework) is a software framework for empirically evaluating covert channels in network protocols running under Linux. CCHEF can be used in real networks with real overt traffic, but can also emulate covert channels using overt traffic from trace files. CCHEF was mainly designed for research purposes, but not to be (mis)used for real covert channel communication. Therefore, the sender/receiver application is a normal user space programs and not disguised in any way.

Download Website Updated 10 Apr 2014 CyaSSL

Screenshot
Pop 543.14
Vit 74.02

The CyaSSL embedded SSL library is a lightweight SSL library written in ANSI C and targeted for embedded and RTOS environments, primarily because of its small size, speed, and feature set. It is commonly used in standard operating environments and cloud services as well because of its royalty-free pricing and excellent cross platform support. CyaSSL supports industry standards up to the current TLS 1.2 and DTLS 1.2 levels, is up to 20 times smaller than OpenSSL, and offers progressive ciphers such as HC-128, RABBIT, and NTRU.

Download No website Updated 01 Mar 2013 Digital Forensics Framework

Screenshot
Pop 141.94
Vit 4.90

DFF (Digital Forensics Framework) is a simple but powerful tool with a flexible module system which will help you in your digital forensics works, including file recovery due to error or crash, evidence research and analysis, etc. DFF provides a robust architecture and some handy modules.

Download Website Updated 21 Apr 2014 Disk ARchive

Screenshot
Pop 845.81
Vit 297.37

Dar is a shell command that makes backup of a directory tree and files. Its features include splitting archives over several files, DVD, CD, ZIP, or floppies, compression, full or differential backups, strong encryption, proper saving and restoration of hard links, extended attributes, file forks, Door inodes, and sparse files, remote backup using pipes and external commands (such as ssh), and rearrangement of the "slices" of an existing archive. It can run commands between slices, before and after saving some defined files or directories (for a proper database backup, for example), and quickly retrieve individual files from differential and full backups. Several external GUIs exist as alternatives to its CLI interface, like kdar, DarGUI, SaraB, etc.

Download Website Updated 15 Feb 2011 Fina

Screenshot
Pop 54.41
Vit 3.73

Fina is a simple, robust bash script that loads iptables rules from a rules directory. As such, it isn't concerned with creating rules for you; it just helps you load them in a robust way, going back to older or safe rules when things go wrong.

Screenshot

Project Spotlight

libmodbus (stable)

A multiplatform Modbus library.

Screenshot

Project Spotlight

TurnKey Trac Appliance

A Trac appliance that is easy to use and lightweight.