RSS 51 projects tagged "Security"

Download Website Updated 07 Nov 2003 Better ASN

Screenshot
Pop 17.55
Vit 61.81

Better ASN is a Java ASN.1 API that focuses on speed and efficiency rather than extended functionality. This strategy prescribes one-pass decoding and near 100% encoding efficiency for typical ASN.1 usage patterns. Although BASN was developed for use by a Certificate Authority, the release comes packaged with an ASN.1 to Java compiler, which can be used to generate Java implementations of ASN.1 structures. This allows the API to be used for any Java application that may require ASN.1 decoding/manipulation/encoding.

No download Website Updated 18 Dec 2004 MpNT

Screenshot
Pop 19.05
Vit 58.43

MpNT is a multi-precision number theory library that provides a base for building cryptographic applications. It may also be used in any other domain where efficient large number computations are required. The library supports integer, modular, and floating point arithmetic with practically unlimited precision. It is both speed efficient and highly portable without disregarding code structure and clarity.

No download Website Updated 02 Jun 2005 OpenPMF

Screenshot
Pop 24.74
Vit 56.99

OpenPMF is a policy management framework which is currently used with various technologies like CORBA/CCM/EJB. It allows the centralized, integrated management of security policies in very demanding, heterogeneous (legacy) environments.

No download Website Updated 18 Oct 2006 Raiden

Screenshot
Pop 11.66
Vit 52.39

Raiden is an extremely lightweight and fast block cipher, developed using genetic programming. Its aims are to be simple enough to be remembered by heart and to be compact, highly portable, and light enough to be implemented in resource constrained environments. It was developed with the intention of being an alternative to TEA, with the same speed and without any of its known weaknesses.

Download Website Updated 16 Jan 2009 Mobius Program Verification Environment

Screenshot
Pop 27.13
Vit 43.86

The Mobius verification environment supports the development of specifications, programs, and proofs of their security properties. It will support both source code and bytecode level verification, and be able to produce the output necessary for the generation of PCC certificates.

Download Website Updated 19 Jan 2011 Kismet

Screenshot
Pop 408.55
Vit 16.25

Kismet is an 802.11 layer 2 wireless network detector, sniffer, and intrusion detection system. It will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, 802.11g, and 802.11n traffic (device drivers permitting). It identifies networks by passively collecting packets and detecting standard named networks, detecting (and given time, decloaking) hidden networks, and inferring the presence of non-beaconing networks via data traffic.

Download Website Updated 25 Dec 2013 Malheur

Screenshot
Pop 108.50
Vit 11.47

Malheur is a tool for the automatic analysis of malware behavior (program behavior recorded from malicious software in a sandbox environment). It is designed to support the regular analysis of malicious software and the development of detection and defense measures. It allows for identifying novel classes of malware with similar behavior and assigning unknown malware to discovered classes. It can be applied to recorded program behavior of various formats as long as monitored events are separated by delimiter symbols, e.g. as in reports generated by the popular malware sandboxes CWSandbox, Anubis, Norman Sandbox, and Joebox.

Download Website Updated 13 Oct 2009 MCS MyRoute

Screenshot
Pop 239.32
Vit 10.31

MCS MyRoute helps diagnose connectivity problems with detailed network routing discovery and analysis, providing visibility to poor-performing networks and devices. It includes a Java applet that enables remote users to easily test connections from the MyRoute server. Essential diagnostic tools including traceroute, ping, reverse DNS, and whois are combined into a single graphical interface that analyzes Internet connections, reporting quick and essential data points for finding connectivity problems. An IP location database identifies the geographical location of IP addresses and Web servers, showing the path of an Internet connection on a global map.

Download Website Updated 20 Feb 2011 C++ Elliptic Curve Cryptography library

Screenshot
Pop 126.81
Vit 7.70

Libecc is a C++ elliptic curve cryptography library that supports fixed-size keys for maximum speed. The goal of this project is to become the first free Open Source library providing the means to generate safe elliptic curves, and to provide an important source of information for anyone with general interest in ECC.

Download Website Updated 30 Sep 2009 Bit::Vector

Screenshot
Pop 182.10
Vit 7.24

Bit::Vector is a (stand-alone) C library and an object-oriented Perl module (with overloaded operators) which allows you to handle bit vectors, sets (of integers), "big integer arithmetic" (e.g. for cryptography), and boolean matrices (all of arbitrary size) very efficiently.

Screenshot

Project Spotlight

OptiPNG

A lossless PNG optimizer.

Screenshot

Project Spotlight

TurnKey Trac Appliance

A Trac appliance that is easy to use and lightweight.