RSS 930 projects tagged "Linux"

Download Website Updated 01 Jul 2004 stegnate

Screenshot
Pop 15.20
Vit 59.80

stegnate is a program to hide data in BMPs or WAVs. stegnate-gtk is the GTK version. Under GTK versions later than 1.2, it may not compile, but it works from a command prompt and doesnt need GTK at all. At the moment, this software can only hide data in 8 or 16 bit BMPs and 8 or 16 bit WAVs.

Download Website Updated 10 Jun 2003 stmpclean

Screenshot
Pop 29.90
Vit 1.43

The stmpclean utility removes old files (and old empty directories) from the specified directory. It is meant to be used to clean directories such as "/tmp" where old files tend to accumulate. stmpclean never removes files or directories owned by root, which is a feature, not a bug. Great care is taken while descending into the directory, and the operation is secure. Anything that's not a directory, regular file, or symbolic link is also left alone (because programs like screen(1) create sockets and FIFOs under /tmp and expect them to be long-lived). Unlike other programs that do the same task, stmpclean never forks and consumes limited amount of memory. If stmpclean determines a race condition it will log the situation and exit with a failure.

Download No website Updated 01 Feb 2007 stompy the session stomper

Screenshot
Pop 29.66
Vit 1.00

stompy the session stomper is a penetration testing tool that performs an automated analysis and runs an array of fairly sophisticated tests on WWW session identifiers (or any other tokens) to see whether they are reasonably unpredictable or vulnerable to attacks.

Download Website Updated 26 Aug 2002 strip2zsafe

Screenshot
Pop 15.62
Vit 1.00

strip2zsafe converts Strip account information from a Palm PDA to a ZSafe compatible textfile, for use with the Zaurus and other Linux PDAs.

Download Website Updated 30 Apr 2013 strongSwan

Screenshot
Pop 335.96
Vit 25.21

strongSwan is a complete IPsec implementation for the Linux, Android, Maemo, FreeBSD, and Mac OS X operating systems. It interoperates with with most other IPsec-based VPN products via the IKEv2 or IKEv1 key exchange protocols. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface. A rich choice of modular plugins adds additional features like Trusted Network Connect or advanced cryptographical algorithms.

Download Website Updated 22 Apr 2009 suPHP

Screenshot
Pop 97.37
Vit 5.29

suPHP is a combination of an Apache module (mod_suphp) and an executable which provides a wrapper for PHP. With both together, it is possible to execute PHP scripts with the permissions of their owner without having to place a PHP binary in each user's cgi-bin directory. suPHP doesn't need Apache's suExec, and provides a logging function.

Download Website Updated 04 Feb 2012 sud

Screenshot
Pop 31.89
Vit 1.42

sud (superuser daemon) permits a user to switch to root privileges and to use a suid program in a nosuid environment. It is based on a client/server model and on the ability to pass file descriptors between processes. sud permits you to choose your authentication method, and your effective credentials will be checked by using a Unix domain socket.

No download Website Updated 01 Dec 2009 sudosh3

Screenshot
Pop 24.43
Vit 39.98

sudosh3 is an auditing shell and filter based on sudosh2 (a continuation of sudosh). It aims to improve file management and terminal emulation. Passwords are not recorded.

Download Website Updated 13 Aug 2012 sydbox

Screenshot
Pop 116.55
Vit 5.28

sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.

Download Website Updated 15 Oct 2004 systraq

Screenshot
Pop 18.89
Vit 58.90

Systraq sends you a daily email listing the state of your system. If critical system files or user access files (e.g. ~/.ssh/authorized_keys) have changed, you'll get an email within a shorter notice. It consists of few very small shell scripts. It can help you implement a (not too strict) security policy.

Screenshot

Project Spotlight

kcov

A code coverage tester.

Screenshot

Project Spotlight

Guacamole

A pure HTML5/JavaScript VNC viewer.