1971 projects tagged "Security"

Download Website Updated 03 Mar 2013 Botan

Screenshot
Pop 439.22
Vit 40.06

Botan is a crypto library written in C++. It provides a variety of cryptographic algorithms, including common ones such as AES, MD5, SHA, HMAC, RSA, Diffie-Hellman, DSA, and ECDSA, as well as many others that are more obscure or specialized. It also offers SSL/TLS (client and server), X.509v3 certificates and CRLs, and PKCS #10 certificate requests. A message processing system that uses a filter/pipeline metaphor allows for many common cryptographic tasks to be completed with just a few lines of code. Assembly and SIMD optimizations for common CPUs offers speedups for critical algorithms like AES and SHA-1.

No download Website Updated 23 Nov 2002 Bright Noise

Screenshot
Pop 28.57
Vit 1.00

Bright Noise is a terminal wrapper for the text- mode Linux console that adds static to the screen font and continuously modifies the palette. It is intended to render low-quality video, personal, or TEMPEST surveillance less effective.

Download Website Updated 20 Aug 2006 BruteBlock

Screenshot
Pop 38.68
Vit 1.41

Bruteblock allows system administrators to block various bruteforce attacks on UNIX services. The program analyzes system logs and adds attackers' IP addresses into the ipfw2 table, effectively blocking them. Addresses are automatically removed from the table after specified amount of time. Bruteblock uses regular expressions to parse logs, which gives it enough flexibility to be used with almost any network service. Bruteblock doesn't use any external programs and works with ipfw2 tables via the raw sockets API.

Download Website Updated 17 Sep 2003 Bugs Dynamic Cryptography

Screenshot
Pop 18.57
Vit 1.00

Bugs Dynamic Cryptography is a private key cryptography algorithm. The package includes a C Library and many sample applications, including ones for file encryption, secure chatting, and login applications. The algorithm handles stream and block encryption, unlimited Keylength, and a strong key generator. Documentation and a developer HOWTO are included.

Download No website Updated 21 Apr 2009 Bukowski Framework

Screenshot
Pop 14.18
Vit 1.41

Bukowski Framework is intended to demonstrate that current popular approaches to software security (e.g. DAC, VMA randomization, anti-virus, NIDS, etc.) are not sufficient and that other approaches should be considered more seriously (e.g. MAC, design by contract, mutual authentication/authorization, etc.).

Download Website Updated 21 May 2008 Bunny the Fuzzer

Screenshot
Pop 45.78
Vit 2.09

Bunny the Fuzzer is a closed loop, high-performance, general purpose protocol-blind fuzzer for C programs. It uses compiler-level integration to seamlessly inject precise and reliable instrumentation hooks into the traced program. These hooks enable the fuzzer to receive real-time feedback on changes to the function call path, call parameters, and return values in response to variations in input data.

No download Website Updated 11 Aug 2005 Burp intruder

Screenshot
Pop 35.16
Vit 1.51

Burp intruder is a tool that facilitates automated attacks against Web-enabled applications. It is highly configurable and can test for common Web application vulnerabilities such as SQL injection, cross-site scripting, buffer overflows, and directory traversal as well as performing brute force attacks against authentication schemes, enumeration, parameter manipulation, trawling for hidden content and functionality, session token sequencing and session hijacking, data mining, concurrency attacks, and application-layer denial-of-service attacks.

No download Website Updated 22 Dec 2007 Burp proxy

Screenshot
Pop 98.50
Vit 3.65

Burp proxy is an interactive HTTP/S proxy server for attacking Web-enabled applications. It operates as a man-in-the-middle between the end browser and the target Web server, and allows the attacker to intercept, inspect, and modify the raw traffic passing in both directions. Text and hex editing may be performed on intercepted traffic. Downstream proxies are supported. Authentication may be done to downstream proxy and Web servers, using basic, NTLM, or digest authentication types.

No download Website Updated 11 Aug 2005 Burp spider

Screenshot
Pop 36.74
Vit 1.86

Burp spider is a tool for enumerating Web-enabled applications. It uses various intelligent techniques to generate a comprehensive inventory of an application's content and functionality. Key features include parsers for HTML and JavaScript, presentation of findings in tree and table formats, handling of HTML forms with automatic or user-guided form submission, authentication to protected areas of the application using supplied credentials, cookie processing, detection of custom "not found" responses, fine-grained scope control, SSL support, identification of dynamic "application" pages which use data parameters or are session-dependent, and IDS evasion techniques.

No download Website Updated 18 Dec 2007 Burp suite

Screenshot
Pop 34.50
Vit 1.65

Burp suite allows an attacker to combine manual and automated techniques to enumerate, analyse, attack, and exploit Web applications. The various burp tools work together effectively to share information and allow findings identified within one tool to form the basis of an attack using another. Numerous interfaces are implemented between the different tools, designed to facilitate and speed up the process of attacking a Web application. All tools share the same robust framework for handling HTTP requests, authentication, downstream proxies, logging, alerting, and extensibility. Burp suite is extensible via the IBurpExtender interface.

Screenshot

Project Spotlight

P-rout

A tool for collecting and viewing data from a Nedap PowerRouter.

Screenshot

Project Spotlight

Ingo

A mail filtering manager, supporting Sieve, procmail, maildrop and IMAP filters.