RSS 930 projects tagged "Linux"

No download No website Updated 11 Feb 2014 txtorcon

Screenshot
Pop 110.22
Vit 6.04

txtorcon is a Twisted-based asynchronous Tor control protocol implementation. Twisted is an event-driven networking engine written in Python, and Tor is an onion-routing network designed to improve people’s privacy and security on the Internet. It includes unit-tests with 96%+ coverage, multiple examples, and documentation. There are abstractions to track Tor configuration and state (circuits, streams), launch private instances, support Hidden Service, and more.

No download No website Updated 21 Jun 2012 Enterprise Audit Shell

Screenshot
Pop 38.31
Vit 25.79

Enterprise Audit Shell (EAS) allows organizations to centrally audit and report UNIX shell access. Unlike Sudosh, the audit logs are sent to a centralized archive and reporting server. Client server authentication and encryption is handled by SSL. It was specifically designed for enterprise, commercial use.

Download Website Updated 21 Jul 2012 ImmediateCrypt

Screenshot
Pop 50.83
Vit 1.48

ImmediateCrypt can easily encrypt and decrypt plain text messages with the AES-256 algorithm (CBC block chaining, PKCS5 padding).

Download Website Updated 04 Mar 2013 nfacct

Screenshot
Pop 53.07
Vit 1.85

nfacct is a command line utility used to create, retrieve, and delete Netfilter accounting objects.

No download Website Updated 15 Jan 2014 SSLsplit

Screenshot
Pop 222.84
Vit 6.21

SSLsplit is a tool that performs man-in-the-middle attacks against SSL/TLS encrypted network connections for network forensics and penetration testing. It terminates SSL/TLS and initiates a new connection to the original destination, logging all data transmitted. It supports plain TCP and SSL, HTTP and HTTPS, and IPv4 and IPv6. For SSL and HTTPS, it generates and signs forged X509v3 certificates on-the-fly using the original certificate's subject DN and subjectAltName extension. It supports Server Name Indication, RSA, DSA, and ECDSA keys, and DHE and ECDHE cipher suites. It can also use existing certificates if the private key is available.

Download Website Updated 22 Apr 2012 Pyama

Screenshot
Pop 42.25
Vit 1.01

Pyama is a system and network monitoring application for desktop Linux users. It gives end users a broader view of what is happening on their systems. The basic idea is to give Linux users an application which can monitor systems like many commercial antivirus HIDS.

Download Website Updated 21 Mar 2014 Collax Business Server

Screenshot
Pop 225.71
Vit 14.08

Collax Business Server is an all-in-one Linux server for small- and medium-sized businesses. It delivers all the important network services within a heterogeneous business environment for communication, infrastructure, compliance, groupware, and storage, all in a reliable and secure way which is easy to manage. It also provides essential security functions such as firewalling and virus and spam filtering, to protect against hacker attacks, viruses, and unsolicited email messages.

Download No website Updated 01 Apr 2012 Trusion

Screenshot
Pop 77.00
Vit 1.01

Trusion is a physical intrusion system that uses users' Webcams to detect motion, which serves as an indicator to start recording video. Optionally, users can choose to have the program upload the videos to an FTP server in the unfortunate event your computer gets stolen or the perpetrator manages to delete the user's local video files. This is a very new project that is enthusiastically welcoming new contributors and their ideas. This project was build using Qt and OpenCV.

Download No website Updated 05 Mar 2012 StopHack

Screenshot
Pop 40.99
Vit 27.87

StopHack is a simple to use and easy to install intrusion prevention system. It is fully adaptable and easily customized to your environment. It is built on top of proven bandwidth arbitration technology so the traffic passing through it won't be slowed down. Every packet is analyzed with regular expression-based behavior anomaly detection, and hackers are blocked immediately. It prevents reflected cross-site scripting, SQL injection, directory traversal, reflected URL redirects, login brute forcing, remote shell execution, and more.

Download Website Updated 25 Feb 2012 Netscape Security Wrapper

Screenshot
Pop 39.37
Vit 1.00

Netscape Security Wrapper manages the loading of NPAPI (Netscape Plugin API) plugins and applies simple policy decisions. The intention is to allow administrators to deploy deprecated, unreliable, or unsafe third party plugins while minimizing the security exposure. Safari, Google Chrome, Firefox, and other NPAPI-compatible browsers are supported on OS X and Linux. Use cases include: restricting plugins to certain domains, restricting the use of deprecated plugins to known outliers, allowing internal corporate workflows which use insecure or deprecated plugins without exposing the plugin to the hostile Internet, and allowing multiple outdated plugin versions (e.g., Java) to co-exist for use in whitelisted, trusted enterprise tools.

Screenshot

Project Spotlight

libagf

A machine-learning library based on kernel estimation.

Screenshot

Project Spotlight

OpenGrok

A fast and usable source code search and cross reference engine.