RSS 1966 projects tagged "Security"

Download Website Updated 03 Nov 2005 trackpeer

Screenshot
Pop 39.82
Vit 1.47

trackpeer is an agent that helps network and server administrators with tracking their users' computers. It makes it possible to determine the MAC addresses of computers over a network, even when the computers are behind NATed gateways. This agent is intended to be used by the administrators who need to identify and locate malicious computers and virus-infected computers in a network such as a middle-sized wireless LAN, public Ethernet jack system, campus, or corporate network.

Download Website Updated 11 Mar 2003 trafcalc

Screenshot
Pop 20.12
Vit 1.00

Trafcalc calculates the size of the TCP-payload on a system via packet capturing and connection tracking at the user level instead of the IP level.

Download No website Updated 11 Aug 2003 trux_motion

Screenshot
Pop 29.58
Vit 1.00

trux_motion is a simple program for detecting motion between a pair of JPEG images. It uses the GD library to load the JPEGs, and it uses a simple, fairly fast algorithm for detecting motion.

No download Website Updated 23 Oct 2002 tsocks

Screenshot
Pop 55.82
Vit 4.12

tsocks provides transparent network access through a SOCKS version 4 or 5 proxy (usually on a firewall). tsocks intercepts the calls applications make to create TCP connections and determines if they can be directly accessed or need the SOCKS server. If they need the SOCKS server they connection is negotiated with the server transparently to the application. This allows existing applications to use SOCKS without recompilation or modification. tsocks is a wrapper library for the libc connect() call.

Download Website Updated 22 Apr 2006 ttmap

Screenshot
Pop 29.58
Vit 1.00

ttmap passively analyzes values of TCP Timestamps in captured IP packets. After collecting enough data, it computes characteristic remote machine parameters. These values let it guess remote operating systems and identify unique machines behind a single IP address. For example, it can analyze remote IP load-balanced clusters.

Download Website Updated 09 Apr 2013 ttyrpld

Screenshot
Pop 109.04
Vit 4.71

ttyrpld is a multi-OS kernel-level tty key and screen logger. Recorded sessions can be followed live or replayed at a later time. Supported platforms are Linux, Solaris, FreeBSD, NetBSD, and OpenBSD.

No download Website Updated 16 Apr 2004 tumbler

Screenshot
Pop 31.46
Vit 1.00

tumbler enables a client to securely tell a server process on a remote machine to execute a predetermined command. It is similar to port knocking, and is designed so that a remote user can securely and stealthily enable server processes, open firewall holes, etc.

Download No website Updated 10 Jun 2003 twocrypt

Screenshot
Pop 46.99
Vit 1.44

twocrypt (2c) is a tool for the ultra-paranoid, providing a traditional crypto, but also an option of deniable (subpoena-proof) encryption. It encrypts one or two files at once. Each file can be recovered with its respective passphrase, but the presence of more than one file cannot be demonstrated, and the presence of this option alone should not be a credible argument for data hiding.

No download No website Updated 30 Jan 2001 twonz

Screenshot
Pop 7.48
Vit 1.00

twonz is a small Perl/TK program which lets you generate and manage the endless quantities of passwords you may need to get anything done online. Rather than making an encrypted database or anything, it just calculates a secure hash of obvious information appended to a user-supplied pad. So you only have to remember the pad, and none of your passwords are actually stored anywhere at all.

No download No website Updated 11 Feb 2014 txtorcon

Screenshot
Pop 109.82
Vit 5.77

txtorcon is a Twisted-based asynchronous Tor control protocol implementation. Twisted is an event-driven networking engine written in Python, and Tor is an onion-routing network designed to improve people’s privacy and security on the Internet. It includes unit-tests with 96%+ coverage, multiple examples, and documentation. There are abstractions to track Tor configuration and state (circuits, streams), launch private instances, support Hidden Service, and more.

Screenshot

Project Spotlight

Aspose.Cells for Reporting Services

Software that lets you export native Excel reports in Microsoft SQL Server 2005 Reporting Services.

Screenshot

Project Spotlight

Hypercube

A graph visualizing tool.