RSS 198 projects tagged "Mac OS X"

Download Website Updated 24 Apr 2014 Hiawatha

Screenshot
Pop 314.03
Vit 378.06

Hiawatha is a secure and advanced Web server for Unix. It has been written with security as its main goal. It features advanced access control, prevention of SQL injection and cross-site scripting, banning of clients who try such exploits, the ability to run CGIs under any UID/GID you want, and many other features. These features make Hiawatha an interesting Web server for those who need more security than what the other available Web servers are offering. Hiawatha is also fast and easy to configure.

Download Website Updated 21 Apr 2014 Disk ARchive

Screenshot
Pop 855.95
Vit 253.18

Dar is a shell command that makes backup of a directory tree and files. Its features include splitting archives over several files, DVD, CD, ZIP, or floppies, compression, full or differential backups, strong encryption, proper saving and restoration of hard links, extended attributes, file forks, Door inodes, and sparse files, remote backup using pipes and external commands (such as ssh), and rearrangement of the "slices" of an existing archive. It can run commands between slices, before and after saving some defined files or directories (for a proper database backup, for example), and quickly retrieve individual files from differential and full backups. Several external GUIs exist as alternatives to its CLI interface, like kdar, DarGUI, SaraB, etc.

Download Website Updated 21 Apr 2014 OVAL Interpreter

Screenshot
Pop 190.45
Vit 128.35

The OVAL Interpreter is a freely available reference implementation that demonstrates the evaluation of OVAL definitions. Based on a set of definitions, the interpreter collects system information, evaluates it, and generates a detailed OVAL results file.

Download No website Updated 14 Apr 2014 MatrixSSL

Screenshot
Pop 462.19
Vit 109.09

MatrixSSL is an embedded SSL and TLS implementation designed for small footprint devices and applications requiring low overhead per connection. The library is less than 50Kb on disk with cipher suites. It includes client and server support through TLS 1.2, mutual authentication, session resumption, and implementations of RSA, ECC, AES, 3DES, ARC4, SHA2, SHA1, and MD5. The source is well documented and contains portability layers for additional operating systems, cipher suites, and cryptography providers.

Download Website Updated 10 Apr 2014 CyaSSL

Screenshot
Pop 552.12
Vit 71.48

The CyaSSL embedded SSL library is a lightweight SSL library written in ANSI C and targeted for embedded and RTOS environments, primarily because of its small size, speed, and feature set. It is commonly used in standard operating environments and cloud services as well because of its royalty-free pricing and excellent cross platform support. CyaSSL supports industry standards up to the current TLS 1.2 and DTLS 1.2 levels, is up to 20 times smaller than OpenSSL, and offers progressive ciphers such as HC-128, RABBIT, and NTRU.

No download Website Updated 02 Oct 2003 Yosi's Anti-Spam POP3 fIlter bot

Screenshot
Pop 10.91
Vit 62.11

yaspi (Yosi's Anti-Spam POP3 fIlter bot) is a POP3 mail-scanner specifically made to combat mail bombings caused by viruses (i.e. Swen). It connects to the POP3 server, inspects the messages, and deletes the infected ones without ever downloading them. Its most interesting feature is that it can automatically send abuse reports to the ISPs from which the infected mails originated.

Download Website Updated 03 Oct 2003 The Sleuth Kit

Screenshot
Pop 60.50
Vit 62.10

The Sleuth Kit is a collection of open source file system forensics tools that allow one to view allocated and deleted data from NTFS, FAT, FFS, and EXT2FS images. The Autopsy Forensic Browser provides a graphical interface to The Sleuth Kit.

No download Website Updated 24 Jan 2004 NewPKI

Screenshot
Pop 22.18
Vit 61.18

NewPKI is a PKI based on the OpenSSL low-level API. All data is handled through a database, and there is an SQL abstraction layer available.

Download Website Updated 24 Dec 2013 Tor

Screenshot
Pop 785.67
Vit 60.42

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Download Website Updated 01 Apr 2014 Aircrack-ng

Screenshot
Pop 647.76
Vit 54.63

aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.).

Screenshot

Project Spotlight

MASTIFF

A static analysis automation framework.

Screenshot

Project Spotlight

SYINF

A portable, cross-platform program for brief system information.