RSS 1962 projects tagged "Security"

Download No website Updated 14 Apr 2014 MatrixSSL

Screenshot
Pop 360.95
Vit 302.88

MatrixSSL is an embedded SSL and TLS implementation designed for small footprint devices and applications requiring low overhead per connection. The library is less than 50Kb on disk with cipher suites. It includes client and server support through TLS 1.2, mutual authentication, session resumption, and implementations of RSA, ECC, AES, 3DES, ARC4, SHA2, SHA1, and MD5. The source is well documented and contains portability layers for additional operating systems, cipher suites, and cryptography providers.

No download Website Updated 13 Apr 2014 PeaZip

Screenshot
Pop 1,011.33
Vit 293.85

PeaZip is a cross-platform file archiver utility that provides a unified portable GUI for many open source technologies like 7-Zip, FreeArc, PAQ, UPX, etc. Creates 7Z, ARC, BZ2, GZ, *PAQ, PEA, QUAD/BALZ, TAR, UPX, WIM, XZ, and ZIP files. It extracts more than 150 archive types: ACE, ARJ, CAB, DMG, ISO, LHA, RAR, UDF, ZIPX, and more. Features of PeaZip include extracting, creating, and converting multiple archives at once, creating self-extracting archives, split/join files, strong encryption with two factor authentication, an encrypted password manager, secure deletion, find duplicate files, calculate hashes, and export job definitions as scripts.

Download Website Updated 14 Apr 2014 fwknop

Screenshot
Pop 486.75
Vit 273.69

fwknop implements an authorization scheme called Single Packet Authorization that requires only a single encrypted packet to communicate various pieces of information, including desired access through an iptables, ipfw, or pf firewall policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap. Also supported is a robust port knocking implementation based around iptables log messages.

Download Website Updated 08 Apr 2014 GNUnet

Screenshot
Pop 672.14
Vit 223.92

GNUnet is a peer-to-peer framework with focus on providing security. All peer-to-peer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP, TCP, HTTP, HTTPS, or direct 802.11 (WLAN). GNUnet supports accounting to provide contributing nodes with better service. The services built on top of the framework include anonymous file sharing and a virtual network providing IPv4-IPv6 transition via protocol translation over the P2P network.

Download Website Updated 12 Apr 2014 audit daemon

Screenshot
Pop 202.06
Vit 204.42

The audit package contains the user-space utilities for creating audit rules, as well as for storing, searching, and generating reports from the audit records generated by the audit subsystem in the Linux 2.6 kernel and higher. It has a real-time plugin interface for event analysis and remote logging of events.

Download No website Updated 26 Mar 2014 WiKID Strong Authentication System

Screenshot
Pop 2,471.80
Vit 186.67

The WiKID Strong Authentication System is a highly scalable, secure two-factor authentication system. It is simple to implement and maintain, allows users to be validated automatically, requires no hardware tokens, has a simple API for application support (via Ruby, PHP, Java, COM, Python, etc.), supports multiple domains, and supports replication for fault tolerance and scalability. It also supports mutual /host and transaction authentication, wireless tokens only domains, locked tokens (to your PC), anti-keystroke logger keypad PIN entry, etc.

Download Website Updated 13 Apr 2014 cryptmount

Screenshot
Pop 443.89
Vit 185.80

cryptmount is a utility for creating and managing secure filing systems on GNU/Linux systems. After initial setup, it allows any user to mount or unmount filesystems on demand, solely by providing the decryption password, with any system devices needed to access the filing system being configured automatically. A wide variety of encryption schemes (provided by the kernel dm-crypt system and the libgcrypt library) can be used to protect both the filesystem and the access key. The protected filing systems can reside in either ordinary files or disk partitions. The package also supports encrypted swap partitions, and automatic configuration on system boot-up.

Download No website Updated 10 Apr 2014 Lynis

Screenshot
Pop 1,803.95
Vit 143.84

Lynis is an auditing and hardening tool for Unix derivatives like Linux/BSD/Solaris. It scans systems to detect software and security issues. Besides security-related information, it will also scan for general system information, installed packages, and possible configuration mistakes. The software is aimed at assisting automated auditing, software patch management, and vulnerability and malware scanning of Unix-based systems.

Download Website Updated 03 Mar 2014 GNU Transport Layer Security Library

Screenshot
Pop 1,288.42
Vit 125.23

GnuTLS is a secure communications library implementing the SSL, TLS, and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols, as well as APIs to parse and write X.509, PKCS #12, OpenPGP, and other required structures. It is intended to be portable and efficient with a focus on security and interoperability.

Download Website Updated 10 Apr 2014 Tor-ramdisk

Screenshot
Pop 430.42
Vit 121.71

Tor-ramdisk is a uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced in tor-ramdisk by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key, which may be exported and imported by FTP or SSH.

Screenshot

Project Spotlight

CloverETL

A Java framework for building data integration and ETL applications.

Screenshot

Project Spotlight

cdist

Usable configuration management.