RSS 19 projects tagged "Security"

No download No website Updated 04 Mar 2014 AntiJOP

Screenshot
Pop 91.67
Vit 1.01

AntiJOP is an anti-malware solution that recodes assembly language to remove JOP attack gadgets. JOP attacks on x86 often hinge on the availability of 0xFF bytes in preexisting code, which can be co-opted to serve as register-indirect call instructions. AntiJOP removes instances of 0xFF bytes that may exist, for example, in immediate values, MOD/RM bytes, etc.

No download No website Updated 10 Sep 2013 RAVM

Screenshot
Pop 35.24
Vit 15.04

RAVM is a fast virtual machine coded mainly in x86 assembly. It has 256 registers that are 32-bits each, and it uses 32-bit instructions. On a 2.4 GHz Intel CPU it can execute nearly 400 MIPS with bounds checking on memory accesses. An assembler is provided.

Download Website Updated 12 Jul 2006 HAVEGE

Screenshot
Pop 29.10
Vit 1.00

HAVEGE (HArdware Volatile Entropy Gathering and Expansion) is a user-level software unpredictable random number generator for general-purpose computers that exploits modifications of the internal volatile hardware states as a source of uncertainty. It combines on-the-fly hardware volatile entropy gathering with pseudo-random number generation. The internal state includes thousands of internal volatile hardware states and is merely unmonitorable. It can support several hundreds of megabits per second on current workstations and PCs.

Download Website Updated 16 Oct 2005 ELF Encrypter

Screenshot
Pop 43.65
Vit 1.00

The ELF-Encrypter program suite is a collection of programs to encrypt ELF binaries using various algorithms, including the ones provided by GPG. One can choose a lot of methods to obtain the encryption key, such as hashing a list of PCI peripheals, MAC addresses of ethernet cards, file inode numbers, passphrases and passwords. The suite also contains programs to manipulate and inject plain or encrypted code into ELF binaries.

No download Website Updated 08 Oct 2004 Unicornscan

Screenshot
Pop 28.98
Vit 1.00

Unicornscan is an information gathering and correlation engine. It was designed to provide an engine that is scalable, accurate, flexible, and efficient. Unicornscan is an attempt at a user-land distributed TCP/IP stack. It is intended to provide a researcher with a superior interface for introducing a stimulus into and measuring a response from a TCP/IP enabled device or network.

No download Website Updated 20 May 2004 Torque Network Library

Screenshot
Pop 45.83
Vit 1.42

The Torque Network Library is a robust, secure, and easy-to-use cross-platform C++ networking API designed for high performance simulations and games. It features a UDP- based connection architecture with DoS prevention functionality, different types of data guarantee, bit stream compression, server object replication and updating, and a simple, highly space efficient RPC mechanism. It includes a deterministic application journaling replay function for eliminating hard to find networking bugs.

Download No website Updated 06 Dec 2009 Metasploit Framework

Screenshot
Pop 190.49
Vit 6.06

The Metasploit Framework is a platform for developing, testing, and using exploit code. The framework has been used on platforms ranging from large mainframes to the Apple iPhone.

Download Website Updated 22 Mar 2004 Eckbox

Screenshot
Pop 67.51
Vit 2.00

Eckbox is van Eck Phreaking tool that interprets a radio signal emanating from a computer's monitor to recreate the image (in black and white) that is displayed on it. It could be used as a valuable security tool for testing otherwise secure computers or for developing hardware and software to counter this type of remote shoulder-surfing. It is not intended to be used for illegal purposes, and includes information on the hardware required.

Download Website Updated 17 Jul 2011 crypt_blowfish

Screenshot
Pop 128.19
Vit 6.30

crypt_blowfish is an efficient implementation of a modern password hashing algorithm, based on the Blowfish block cipher, provided via the crypt(3) and a reentrant interface. It is compatible with bcrypt as used in OpenBSD. It is adaptable to future processor performance improvements, allowing you to arbitrarily increase the processing cost of checking a password while still maintaining compatibility with your older password hashes. The hashes it produces are several orders of magnitude stronger than traditional Unix DES-based or FreeBSD-style MD5-based hashes.

Download Website Updated 10 Jul 2004 Fenris

Screenshot
Pop 92.88
Vit 1.54

Fenris is a multipurpose tracer, debugger, and code analysis tool that detects and documents high-level language constructions, can recover symbols, graph program execution flow, detect internal functions, recover symbol tables, and deal with anti-debugging protection. It features a command-line interface as well as a SoftICE-alike GUI and Web frontend.

Screenshot

Project Spotlight

jpegoptim

A tool for optimizing JPEG files.

Screenshot

Project Spotlight

123 Flash Chat Moodle Module

A chat room module for Moodle.