RSS 930 projects tagged "Linux"

Download Website Updated 30 Nov 2013 x509watch

Screenshot
Pop 93.62
Vit 7.64

x509watch is a simple command line application that can be used to list soon expiring or already expired X.509 certificates, such as SSL certificates. All certificates are searched by default in the standard PKI directory, but any other directory can be specified as a parameter. Only Base64 encoded DER and PEM X.509 certificates are supported.

Download No website Updated 07 Jul 2010 pybikey

Screenshot
Pop 26.94
Vit 37.16

pybikey is a Python/Django based implementation of a Yubikey validation server. Right now pybikey supports validation protocol 1.1.

No download No website Updated 10 Jun 2012 LDAPAuthManager

Screenshot
Pop 73.18
Vit 2.34

LDAPAuthManager is a Web-based application designed to make LDAP user and group management easy and quick.

Download Website Updated 09 Apr 2011 agentsmith

Screenshot
Pop 70.84
Vit 1.59

agentsmith is a daemon that continuously monitors a log file for break-in attempts by remote hosts. Upon detection of a break-in attempt, it launches a user defined script or application, which can do virtually anything from sending mail messages to whatever else you might think of. The criteria for what is considered a break-in attempt can be configured by means of a regular expression.

No download No website Updated 13 Sep 2013 IPQ BDB

Screenshot
Pop 45.91
Vit 3.61

A fail2ban lite. IPQ BDB is a netfilter userspace daemon that can block or mark IP packets according to iptables rules that issue the corresponding -j NFQUEUE, as well as a Berkeley database of bad IPv4 addresses. A log parser and a banning utility add entries to the database. An IP has to be caught a configurable number of times before being blocked. Transitions between blocked and non-blocked are faded using probabilities. A halving period governs IP rehabilitation.

Download Website Updated 24 May 2010 VPPPN

Screenshot
Pop 32.43
Vit 37.74

VPPPN stands for virtual peer-to-peer private networking. The project provides a VPN client using a custom protocol to be able to set up a point-to-point dynamic virtual network. This differs from OpenVPN in that it does not need a central server to pass the network's traffic. A central server exists to allocate IP addresses and provide a point of contact for the clients, but once connections are established, these services are no longer needed. This means that a VPPN network is free (as in beer), since to set up a network you do not need to invest in an always-on Internet server. Once established, a VPPPN network behaves in a similar way to a normal IP network. To the end user, this means you can set up an office network and drag and drop files between computers in a secure manner over the Internet.

Download Website Updated 25 Mar 2014 Suricata

Screenshot
Pop 922.94
Vit 54.10

Suricata is an Intrusion Detection and Prevention (IDS/IPS) engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support, file extraction capabilities, and many more features. It's capable of loading existing Snort rules and signatures, and supports many frontends through Barnyard2.

Download No website Updated 21 Apr 2010 UFPM

Screenshot
Pop 24.49
Vit 1.00

When moving files between filesystems that have permissions and those that do not, the user home directory is populated with files of all sorts of permissions. UFPM (Uniform File Permission Modifier) has been designed to modify all files and directories to have a uniform permission set based upon their file type.

Download Website Updated 09 Apr 2010 TinyIDS

Screenshot
Pop 47.96
Vit 1.00

TinyIDS is a distributed intrusion detection system (IDS) for Unix systems. It is based on the client/server architecture and has been developed with security in mind. The client, tinyids, collects information from the local system by running its collector backends. The collected information may include anything, from file contents to file metadata or even the output of system commands. The client passes all this data through a hashing algorithm and a unique checksum (hash) is calculated. This hash is then sent to one or more TinyIDS servers (tinyidsd), where it is compared with a hash that had previously been stored in the databases of those remote servers for this specific client. A response indicating the result of the hash comparison is finally sent back to the client. Management of the remotely stored hash is possible through the client's command line interface. Communication between the client and the server can be encrypted using RSA public key infrastructure (PKI).

Download Website Updated 05 Apr 2011 WhatWeb

Screenshot
Pop 110.90
Vit 3.07

WhatWeb identifies Websites. Its goal is to answer the question, “What is that Website?”. WhatWeb recognizes Web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, Web servers, and embedded devices. WhatWeb has over 900 plugins, each to recognize something different. It also identifies version numbers, email addresses, account IDs, Web framework modules, SQL errors, and more. It can be stealthy and fast, or thorough but slow. It supports an aggression level to control the trade off between speed and reliability.

Screenshot

Project Spotlight

fgallery

A minimalist JavaScript gallery.

Screenshot

Project Spotlight

Lernstick Personal Learning Environment

A Live Linux distribution with a focus on education.