RSS 198 projects tagged "Mac OS X"

Download No website Updated 14 Apr 2014 MatrixSSL

Screenshot
Pop 443.97
Vit 139.23

MatrixSSL is an embedded SSL and TLS implementation designed for small footprint devices and applications requiring low overhead per connection. The library is less than 50Kb on disk with cipher suites. It includes client and server support through TLS 1.2, mutual authentication, session resumption, and implementations of RSA, ECC, AES, 3DES, ARC4, SHA2, SHA1, and MD5. The source is well documented and contains portability layers for additional operating systems, cipher suites, and cryptography providers.

Download Website Updated 10 Apr 2014 CyaSSL

Screenshot
Pop 539.96
Vit 83.98

The CyaSSL embedded SSL library is a lightweight SSL library written in ANSI C and targeted for embedded and RTOS environments, primarily because of its small size, speed, and feature set. It is commonly used in standard operating environments and cloud services as well because of its royalty-free pricing and excellent cross platform support. CyaSSL supports industry standards up to the current TLS 1.2 and DTLS 1.2 levels, is up to 20 times smaller than OpenSSL, and offers progressive ciphers such as HC-128, RABBIT, and NTRU.

No download Website Updated 02 Oct 2003 Yosi's Anti-Spam POP3 fIlter bot

Screenshot
Pop 10.68
Vit 62.08

yaspi (Yosi's Anti-Spam POP3 fIlter bot) is a POP3 mail-scanner specifically made to combat mail bombings caused by viruses (i.e. Swen). It connects to the POP3 server, inspects the messages, and deletes the infected ones without ever downloading them. Its most interesting feature is that it can automatically send abuse reports to the ISPs from which the infected mails originated.

Download Website Updated 03 Oct 2003 The Sleuth Kit

Screenshot
Pop 61.48
Vit 62.07

The Sleuth Kit is a collection of open source file system forensics tools that allow one to view allocated and deleted data from NTFS, FAT, FFS, and EXT2FS images. The Autopsy Forensic Browser provides a graphical interface to The Sleuth Kit.

Download Website Updated 24 Dec 2013 Tor

Screenshot
Pop 792.74
Vit 61.39

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

No download Website Updated 24 Jan 2004 NewPKI

Screenshot
Pop 21.54
Vit 61.15

NewPKI is a PKI based on the OpenSSL low-level API. All data is handled through a database, and there is an SQL abstraction layer available.

Download Website Updated 01 Apr 2014 Aircrack-ng

Screenshot
Pop 640.13
Vit 59.81

aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.).

No download Website Updated 11 Apr 2014 OpenDNSSEC

Screenshot
Pop 234.32
Vit 55.39

OpenDNSSEC is software that manages the security of domain names on the Internet. The project intends to drive adoption of Domain Name System Security Extensions (DNSSEC) to further enhance Internet security.

Download Website Updated 25 Mar 2014 Suricata

Screenshot
Pop 921.77
Vit 51.04

Suricata is an Intrusion Detection and Prevention (IDS/IPS) engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support, file extraction capabilities, and many more features. It's capable of loading existing Snort rules and signatures, and supports many frontends through Barnyard2.

Download Website Updated 18 Jan 2014 Disk ARchive

Screenshot
Pop 811.13
Vit 49.32

Dar is a shell command that makes backup of a directory tree and files. Its features include splitting archives over several files, DVD, CD, ZIP, or floppies, compression, full or differential backups, strong encryption, proper saving and restoration of hard links, extended attributes, file forks, Door inodes, and sparse files, remote backup using pipes and external commands (such as ssh), and rearrangement of the "slices" of an existing archive. It can run commands between slices, before and after saving some defined files or directories (for a proper database backup, for example), and quickly retrieve individual files from differential and full backups. Several external GUIs exist as alternatives to its CLI interface, like kdar, DarGUI, SaraB, etc.

Screenshot

Project Spotlight

brothersinarms

A Super Mario Bros. game.

Screenshot

Project Spotlight

ACE

An object-oriented C++ class library and framework.