RSS 51 projects tagged "Scientific/Engineering"

Download Website Updated 25 Dec 2013 Malheur

Screenshot
Pop 110.25
Vit 11.65

Malheur is a tool for the automatic analysis of malware behavior (program behavior recorded from malicious software in a sandbox environment). It is designed to support the regular analysis of malicious software and the development of detection and defense measures. It allows for identifying novel classes of malware with similar behavior and assigning unknown malware to discovered classes. It can be applied to recorded program behavior of various formats as long as monitored events are separated by delimiter symbols, e.g. as in reports generated by the popular malware sandboxes CWSandbox, Anubis, Norman Sandbox, and Joebox.

Download Website Updated 16 Jan 2009 Mobius Program Verification Environment

Screenshot
Pop 26.91
Vit 43.81

The Mobius verification environment supports the development of specifications, programs, and proofs of their security properties. It will support both source code and bytecode level verification, and be able to produce the output necessary for the generation of PCC certificates.

Download Website Updated 21 Aug 2008 MonoDecrypt

Screenshot
Pop 17.41
Vit 1.00

MonoDecrypt uses pattern matching and its knowledge about character frequencies in order to decrypt messages encoded with a monoalphabetic substitution cipher. MonoDecrypt can decrypt texts of any language, as long as it has sufficient information about the language. Depending on the information you give it, the tool decrypts about 50%-100% on its own. Then you can decrypt the remaining data by filling the gaps or correcting bad guesses. MonoDecrypt can also encrypt texts using monoalphabetic substitution.

Download Website Updated 10 Dec 2008 Nebula Intrusion Signature Generator

Screenshot
Pop 36.93
Vit 1.48

Nebula is a data analysis tool that automatically generates intrusion signatures from attack traces. It runs as a daemon that processes data submitted from honeypots. New signatures are published as Snort rules and can be used to defend a network from future intrusion attempts.

Download Website Updated 04 Mar 2008 RadialNet

Screenshot
Pop 62.50
Vit 2.47

RadialNet is a network visualization tool. It consists in a graphical visualization of the networks mapped with Nmap, with some efforts to make it easy to find security problems.

Download Website Updated 14 Dec 2009 Virtual Ideal Functionality Framework

Screenshot
Pop 40.39
Vit 3.87

Virtual Ideal Functionality Framework is a framework for creating efficient and secure multi-party computations (SMPC). Players, who do not trust each other, participate in a joint computation based on their private inputs. The computation is done using a cryptographic protocol which allows them to obtain a correct answer without revealing their inputs. Operations supported include addition, multiplication, and comparison, all with Shamir secret shared outputs.

Download Website Updated 28 Mar 2009 Obol

Screenshot
Pop 18.33
Vit 2.08

Obol is a specialized high-level programming language for security protocols. The idea is to program closer to the abstractions used to describe and analyze security protocols, and leave all the nasty details to the language's runtime. The runtime will then handle "mundane" issues such as message representation, communication, cryptographic transformations and so on. The language is interpreted, and the runtime written in Java.

Download Website Updated 29 Dec 2009 TNV

Screenshot
Pop 95.69
Vit 3.46

TNV (The Network Visualizer or Time-based Network Visualizer) depicts network traffic by visualizing packets and links between local and remote hosts. It is intended for network traffic analysis to facilitate learning what constitutes 'normal' activity on a network, investigating packet details and security events, or for network troubleshooting. It can open saved libpcap (from tcpdump, windump, ethereal, etc.) formatted files or capture live packets on the wire, and export data in libpcap format or save the data to a MySQL database to enable the examination of trends over time.

Download Website Updated 25 Feb 2008 BinarySEC

Screenshot
Pop 39.37
Vit 2.45

BinarySEC is an intelligent Web application firewall designed to suppress malicious traffic on Web sites and applications. Its artificial intelligence engine learns normal traffic and blocks malicious requests with very high accuracy. BinarySEC secures against a wide range of attacks, including cross-site scripting (XSS), SQL injection, command injection, PHP includes, parameter tampering, buffer overflow, directory traversal, attack obfuscation, and more. BinarySEC for Apache includes a graphical installer and a Web-based administration interface.

No download Website Updated 18 Oct 2006 Raiden

Screenshot
Pop 11.40
Vit 52.35

Raiden is an extremely lightweight and fast block cipher, developed using genetic programming. Its aims are to be simple enough to be remembered by heart and to be compact, highly portable, and light enough to be implemented in resource constrained environments. It was developed with the intention of being an alternative to TEA, with the same speed and without any of its known weaknesses.

Screenshot

Project Spotlight

phodav

A WebDAV server.

Screenshot

Project Spotlight

Aspose.Pdf for Reporting Services

A system to generate PDF reports from MS SQL Server 2000 & 2005 Reporting Services.