RSS 1966 projects tagged "Security"

Download Website Updated 04 Jul 2008 ComboValidation

Screenshot
Pop 9.27
Vit 1.00

ComboValidation is a class meant to validate HTML forms via PHP and JavaScript in the simplest possible way. All you need to do is to create an array of form fields' information with the required parameters and then call a few methods. It is customizable (validation and view), cross-browser (IE6+, Firefox2+, Opera7+, Safari3+, and all Mozilla based browsers), very well tested, easily integrated, lightweight, extensible, PHP 4 and 5 compatible, multi-lingual, and XHML valid, and has AJAX support.

No download Website Updated 09 Aug 2010 Pure PHP radius class

Screenshot
Pop 42.01
Vit 1.00

Pure PHP radius class can be used to authenticate users with a RADIUS network access server according to RFC 2865. It connects to a Radius server given its IP address, and requests access on behalf of a user given his password. Once authenticated, the class may return the attributes of the authorized user. This class works with at least the following RADIUS servers: TekRADIUS and TekRADIUS LT (free RADIUS server under Windows); Authenex Strong Authentication System (ASAS) with two-factor authentication; FreeRADIUS; Microsoft Radius server IAS; Radl; RSA SecurID; WinRadius; and ZyXEL ZyWALL OTP (One-Time Password for Two-Factor Authentication, Authenex ASAS branded by ZyXEL).

Download Website Updated 09 Jul 2008 Dnmalloc

Screenshot
Pop 31.37
Vit 1.00

Dnmalloc is an allocator that keeps heap management data separate from the heap itself. As a result, dnmalloc is not vulnerable to corruption of the heap management information by heap buffer overflows or double free errors.

Download Website Updated 10 Jul 2008 libapache2-mod-scramble-ip

Screenshot
Pop 22.58
Vit 1.00

libapache2-mod-scramble-ip is an Apache 2 module that works like mod_removeip, but instead of just overwriting the IP address with 127.0.0.1, it encrypts the IP address. This way you always get an IP address to work with (in scripts, etc.) and have the ability to use tools like awstats to analyze your logs. It's in alpha status, but working on some Apache 2 servers, and the 'cost' (load) should be small and reasonable.

Download Website Updated 10 Aug 2008 Poldi

Screenshot
Pop 15.49
Vit 1.00

Poldi is a PAM module that implements authentication through the OpenPGP smart card. It uses the smart card daemon from the GnuPG project for smart card access.

Download Website Updated 11 Aug 2008 Surf Jack

Screenshot
Pop 18.76
Vit 1.00

Surf Jack is a tool which allows one to hijack HTTP connections to steal cookies, even ones on HTTPS sites. It works on both Wifi (monitor mode) and Ethernet.

No download Website Updated 11 Aug 2008 Keyczar

Screenshot
Pop 23.66
Vit 1.00

Keyczar is a cryptographic toolkit designed to make it easier and safer for developers to use cryptography in their applications. It supports authentication and encryption with both symmetric and asymmetric keys. Cryptography is easy to get wrong. Developers can choose improper cipher modes, use obsolete algorithms, compose primitives in an unsafe manner, or fail to anticipate the need for key rotation. Keyczar abstracts some of these details by choosing safe defaults, automatically tagging outputs with key version information, and providing a simple programming interface.

No download Website Updated 17 Aug 2008 xbasics FireHash

Screenshot
Pop 22.58
Vit 1.00

xbasics FireHash helps test the integrity of any file through the generation of checksums/hashes. It provides a simple, yet effective way for generating cryptographic hashes based on many different standard algorithms, including MD5 and SHA512, among many others.

Download Website Updated 18 Aug 2008 Cryptographic Implementations Analysis Too...

Screenshot
Pop 36.44
Vit 1.00

The Cryptographic Implementations Analysis Toolkit (CIAT) is a compendium of command line and graphical tools whose aim is to help in the detection and analysis of encrypted byte sequences within files (executable and non-executable). It is particularly helpful in the forensic analysis and reverse engineering of malware using cryptographic code and encrypted payloads.

Download Website Updated 21 Aug 2008 MonoDecrypt

Screenshot
Pop 17.58
Vit 1.00

MonoDecrypt uses pattern matching and its knowledge about character frequencies in order to decrypt messages encoded with a monoalphabetic substitution cipher. MonoDecrypt can decrypt texts of any language, as long as it has sufficient information about the language. Depending on the information you give it, the tool decrypts about 50%-100% on its own. Then you can decrypt the remaining data by filling the gaps or correcting bad guesses. MonoDecrypt can also encrypt texts using monoalphabetic substitution.

Screenshot

Project Spotlight

Kigo Video Converter Ultimate for Mac

A tool for converting and editing videos.

Screenshot

Project Spotlight

octopress-api

A remote API for administering Octopress instances.