1971 projects tagged "Security"

No download No website Updated 29 Mar 2011 pam_ttylog

Screenshot
Pop 28.50
Vit 1.00

pam_ttylog is a PAM module to log console output of a login shell. pam_ttylog takes an approach that makes a script-like environment in the PAM session section of /bin/login. Thus, the log files are in a user-unreachable directory and have user-unreadable/unwritable permissions. As PAM module, it doesn't need to modify or replace the original /bin/login, getty, telnet, or libraries for its installation and operation.

No download Website Updated 17 Feb 2014 MQ Message Encryption

Screenshot
Pop 37.82
Vit 3.96

MQ Message Encryption (MQME) is a solution that provides encryption for WebSphere MQ message data while it resides in a queue and in the MQ logs. It uses AES and offers the ability to control who accesses protected queues. This control is obtained through the use of UserID grouping, and group files are similar to the Unix /etc/group file. It also has the ability to generate and validate messages using a SHA-2 digital signature.

Download Website Updated 18 Feb 2012 Multi Threaded TCP Port Scanner

Screenshot
Pop 113.45
Vit 3.14

Multi Threaded TCP Port Scanner allows you to scan 65535 TCP ports on an IP address. You can specify how many threads to run and the timeout. Furthermore, it will tell you the MAC address of the target and the services that are running. You can scan IP addresses on your network and find out which open ports you have.

Download Website Updated 06 Jun 2013 Moscrack

Screenshot
Pop 80.50
Vit 5.68

Moscrack is a WPA cracker for use on clusters. It supports MOSIX, SSH, and RSH connectivity and works by reading a word list from STDIN or a file, breaking it into chunks, and passing those chunks off to separate processes that run in parallel. The parallel processes are then executed on different nodes in your cluster. All results are checked and recorded on your master node. Logging and error handling are taken care of. It is capable of running reliably for long periods of time, without the risk of losing data or having to restart. Moscrack uses aircrack-ng by default. Pyrit for WPA cracking and Dehasher for Unix password hashes are supported via plugins.

No download Website Updated 08 Feb 2012 creepy

Screenshot
Pop 88.32
Vit 3.77

creepy is an application that allows you to gather geolocation related information about users from social networking platforms and image hosting services. The information is presented in a map inside the application where all the retrieved data is shown, accompanied with relevant information (i.e. what was posted from that specific location) to provide context to the presentation.

No download Website Updated 11 Mar 2011 Guardog

Screenshot
Pop 25.30
Vit 1.02

Guardog is a simple but powerful intrusion dectection system (IDS) that works by inspecting messages from log files, network packets, and other sources. It uses Perl regular expressions to check for any bad messages.

Download Website Updated 01 Feb 2011 httpforge

Screenshot
Pop 22.85
Vit 35.10

httpforge is a set of shell tools that let you manipulate, send, receive, and analyze HTTP messages. These tools can be used to test, discover, and assert the security of Web servers, apps, and sites. An accompanying Python library is available for extensions.

No download Website Updated 03 Feb 2011 malmon

Screenshot
Pop 30.89
Vit 1.00

malmon is a realtime backdoor/exploit detection and removal daemon. It uses inotify (pyinotify) to monitor file activity in one or more directories and checks files smaller than a size specified in configuration file. It's appropriate for hosting servers.

Download Website Updated 28 Aug 2012 Secure GnuPG Form

Screenshot
Pop 27.66
Vit 1.38

Secure GnuPG Form is a Web form that sends encrypted email and attachments using GnuPG, without the sender needing to have GnuPG installed. Versions are available with Recaptcha.net support and two-factor authentication using a username and password and the free PhoneFactor.com service.

Download Website Updated 12 Feb 2014 OATH Toolkit

Screenshot
Pop 158.44
Vit 16.81

The OATH Toolkit makes it easy to build one-time password authentication systems. It contains shared libraries, commandline tools, and a PAM module. Supported technologies include the event-based HOTP algorithm (RFC4226) and the time-based TOTP algorithm (RFC6238). OATH stands for Open AuTHentication, which is the organization which specifies the algorithms. For managing secret key files, the Portable Symmetric Key Container (PSKC) format described in RFC6030 is supported.

Screenshot

Project Spotlight

P-rout

A tool for collecting and viewing data from a Nedap PowerRouter.

Screenshot

Project Spotlight

Ingo

A mail filtering manager, supporting Sieve, procmail, maildrop and IMAP filters.