RSS 198 projects tagged "Mac OS X"

Download Website Updated 05 Jan 2004 Big Brother

Screenshot
Pop 245.52
Vit 7.09

Big Brother is a combination of monitoring methods. Unlike SNMP where information is just collected and devices polled, Big Brother is designed in such a way that each local system broadcasts its own information to a central location. Simultaneously, Big Brother also polls all networked systems from a central location. This creates a highly efficient and redundant method for proactive network monitoring.

Download Website Updated 13 Apr 2004 C-Kermit

Screenshot
Pop 145.67
Vit 2.95

C-Kermit is a combined serial and network communication software package offering a consistent, medium-independent, cross-platform approach to connection establishment, terminal sessions, file transfer, character-set translation, numeric and alphanumeric paging, and automation of communication tasks. Recent versions include FTP and HTTP clients as well as an SSH interface, all of which can be scripted and aware of character-sets. It supports built-in security methods, including Kerberos IV, Kerberos V, SSL/TLS, and SRP, FTP protocol features such as MLSD, and source-code parity with Kermit 95 2.1 for Windows and OS/2.

Download Website Updated 15 Oct 2008 DansGuardian

Screenshot
Pop 690.23
Vit 13.96

DansGuardian is a Web content filtering proxy that uses Squid to do all the fetching. It filters using multiple methods including, but not limited to, phrase matching, file extension matching, MIME type matching, PICS filtering, and URL/domain blocking. It has the ability to switch off filtering by certain criteria including username, domain name, source IP, etc. The configurable logging produces a log in an easy to read format. It has the option to only log text-based pages, thus significantly reducing redundant information (such as every image on a page).

Download Website Updated 02 Apr 2010 DeleGate

Screenshot
Pop 350.50
Vit 16.18

DeleGate is a multi-purpose application level gateway or proxy server that mediates communication of various protocols, applying cache and conversion for mediated data, controlling access from clients, and routing toward servers. It translates protocols between clients and servers, converting between IPv4 and IPv6, applying SSL (TLS) to arbitrary protocols, merging several servers into a single server view with aliasing and filtering. It can be used as a simple origin server for some protocols (HTTP, FTP, and NNTP).

Download Website Updated 30 Jan 2001 distributed.net clients

Screenshot
Pop 50.44
Vit 1.79

distributed.net is a loosely knit group of computer users from all of the world that is taking up challenges requiring lots of computing power (most notably the RC5, DES, and OGR cracking contests). It is simple to participate in the challenges by downloading and running their client software (which uses idle CPU time to complete its tasks).

Download Website Updated 05 Dec 2011 Ettercap

Screenshot
Pop 390.07
Vit 13.36

Ettercap is a network sniffer/interceptor/logger for ethernet LANs. It supports active and passive dissection of many protocols (even ciphered ones, like SSH and HTTPS). Data injection in an established connection and filtering on the fly is also possible, keeping the connection synchronized. Many sniffing modes were implemented to give you a powerful and complete sniffing suite. Plugins are supported. It has the ability to check whether you are in a switched LAN or not, and to use OS fingerprints (active or passive) to let you know the geometry of the LAN.

Download Website Updated 15 Aug 2011 GMime

Screenshot
Pop 242.72
Vit 15.35

GMime is a C/C++ library for parsing and creating messages using the Multipurpose Internet Mail Extension (MIME).

Download Website Updated 11 Oct 2001 Java Anon Proxy

Screenshot
Pop 81.25
Vit 1.79

Java Anon Proxy attempts to provide a secure and scalable technical infrastructure for anonymous communication.

Download Website Updated 30 May 2013 John the Ripper

Screenshot
Pop 1,496.41
Vit 27.00

John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, lots of other hashes and ciphers are added in the community-enhanced version (-jumbo), and some are added in John the Ripper Pro.

Download Website Updated 29 Jan 2011 Nmap Security Scanner

Screenshot
Pop 974.24
Vit 19.54

Nmap ("Network Mapper") is a utility for network exploration, administration, and security auditing. It uses IP packets in novel ways to determine which hosts are available online (host discovery), which TCP/UDP ports are open (port scanning), and what applications and services are listening on each port (version detection). It can also identify remote host OS and device types via TCP/IP fingerprinting. Nmap offers flexible target and port specifications, decoy/stealth scanning for firewall and IDS evasion, and highly optimized timing algorithms for fast scanning.

Screenshot

Project Spotlight

Wenity

A multi-platform Zenity clone.

Screenshot

Project Spotlight

XML Configuration File Editor

A Web service to edit an XML configuration file.