RSS 31 projects tagged "Security"

Download No website Updated 19 Jul 2013 Jumblar

Screenshot
Pop 38.61
Vit 1.02

Jumblar is a tool that converts map coordinates into passwords. It hopes to provide increased user security by assuming that it is easier for people to remember a secret location than a strong password, and that a location that could be anywhere in the world is practically impossible for others to guess. By using this property of secret locations, secure passwords can be generated. SCrypt is used to protect user information.

Download Website Updated 24 Feb 2013 ANNFiD

Screenshot
Pop 41.90
Vit 1.04

ANNFiD is an experimental forensic tool that identifies file types using neural networks. A GUI tool is used to train the network for new file types. It is intended to be used to determine the nature of corrupted files.

Download Website Updated 25 Feb 2012 Netscape Security Wrapper

Screenshot
Pop 39.05
Vit 1.00

Netscape Security Wrapper manages the loading of NPAPI (Netscape Plugin API) plugins and applies simple policy decisions. The intention is to allow administrators to deploy deprecated, unreliable, or unsafe third party plugins while minimizing the security exposure. Safari, Google Chrome, Firefox, and other NPAPI-compatible browsers are supported on OS X and Linux. Use cases include: restricting plugins to certain domains, restricting the use of deprecated plugins to known outliers, allowing internal corporate workflows which use insecure or deprecated plugins without exposing the plugin to the hostile Internet, and allowing multiple outdated plugin versions (e.g., Java) to co-exist for use in whitelisted, trusted enterprise tools.

No download No website Updated 21 Apr 2011 Google Authenticator Demo

Screenshot
Pop 18.81
Vit 33.16

Google Authenticator Demo is an implementation of two-factor authentication using the Google Authenticator that can be used on your own site or application. It allows you to register a user name and then log in using the information provided by the Google Authenticator. It also works with OATH HOTP compliant hardware tokens.

No download No website Updated 05 Sep 2010 TCP Input Text

Screenshot
Pop 18.97
Vit 36.43

"TCP Input Text" extracts TCP ports and fully qualified domain names (FQDN) from search results into a .csv file and individual shell scripts for nmap and nc (a.k.a. netcat) to provide assurance of a listening TCP service since the time that has passed of the last crawl performed by the search engine.

Download Website Updated 09 Apr 2010 TinyIDS

Screenshot
Pop 47.79
Vit 1.00

TinyIDS is a distributed intrusion detection system (IDS) for Unix systems. It is based on the client/server architecture and has been developed with security in mind. The client, tinyids, collects information from the local system by running its collector backends. The collected information may include anything, from file contents to file metadata or even the output of system commands. The client passes all this data through a hashing algorithm and a unique checksum (hash) is calculated. This hash is then sent to one or more TinyIDS servers (tinyidsd), where it is compared with a hash that had previously been stored in the databases of those remote servers for this specific client. A response indicating the result of the hash comparison is finally sent back to the client. Management of the remotely stored hash is possible through the client's command line interface. Communication between the client and the server can be encrypted using RSA public key infrastructure (PKI).

No download No website Updated 21 Nov 2010 skipfish

Screenshot
Pop 62.74
Vit 1.55

skipfish is a high-performance, easy, and sophisticated Web application security testing tool. It features a single-threaded multiplexing HTTP stack, heuristic detection of obscure Web frameworks, and advanced, differential security checks capable of detecting blind injection vulnerabilities, stored XSS, and so forth.

No download Website Updated 20 Sep 2010 iexploder

Screenshot
Pop 49.21
Vit 1.85

iExploder is like a fire hydrant full of bad HTML and CSS code to test the stability and security of Web browsers. It is available as a standalone Web server or CGI script. It continuously feeds browsers bad data in the hope that they will eventually crash. It is designed to run for hours, or even days until the browser crashes.

No download Website Updated 05 Feb 2009 m2secret

Screenshot
Pop 19.08
Vit 1.00

m2secret is an encryption/decryption module for Python and CLI utility. It defaults to 256-bit AES with CBC mode, uses the PBKDF2 algorithm to derive keys from passwords, and is based on M2Crypto.

No download Website Updated 11 Aug 2008 Keyczar

Screenshot
Pop 23.66
Vit 1.00

Keyczar is a cryptographic toolkit designed to make it easier and safer for developers to use cryptography in their applications. It supports authentication and encryption with both symmetric and asymmetric keys. Cryptography is easy to get wrong. Developers can choose improper cipher modes, use obsolete algorithms, compose primitives in an unsafe manner, or fail to anticipate the need for key rotation. Keyczar abstracts some of these details by choosing safe defaults, automatically tagging outputs with key version information, and providing a simple programming interface.

Screenshot

Project Spotlight

Mutt Folder List

A mutt patch that adds a sidebar showing all mail folders.

Screenshot

Project Spotlight

Arcavias TYPO3 extension

High performance e-commerce for the TYPO3 content management system.