1971 projects tagged "Security"

Download Website Updated 22 Sep 2012 WhoisUP

Screenshot
Pop 26.72
Vit 25.19

WhoisUP monitors hosts via ICMP and shows the status in a webpage. When a host is down, it can send mail, write a syslog message, open a popup message, or play a sound. It uses Nmap to check hosts continuously.

Download Website Updated 11 May 2013 ipset

Screenshot
Pop 80.62
Vit 2.51

ipset allows administration of sets of IP addresses/networks, ports, MAC addresses, and interfaces, which are stored in hash or bitmap data structures. These can then be used in conjunction with iptables to do fast presence lookups.

Download Website Updated 06 Feb 2014 WAF-FLE

Screenshot
Pop 98.67
Vit 4.26

WAF-FLE is a console for ModSecurity. It allows modsec administrators to view and search events logged by mlogc or mlog2waffle. The dashboard shows a graphical view of events, and when combined with the powerful drill-down filter allows quick searching for relevant events. Events can be viewed in detail, whether sent by one or many sensors.

No download No website Updated 12 Nov 2012 losetup-utils

Screenshot
Pop 31.56
Vit 24.15

losetup-utils are three bash scripts that attempt to make the use of losetup a bit easier and faster. losetup can be fast, easy, and practical if you need to transport sensitive information over the Internet or in CD's, DVD's, or a pendrive. Also, if you want to store private data on your hard disk or in the cloud, an encrypted volume can be a convenient choice. The types of encryption can be any installed on the system.

No download Website Updated 18 Nov 2012 DisPass

Screenshot
Pop 42.57
Vit 24.11

DisPass is a passphrase generator that generates unique passphrases formed from a master password and a label, helping you get rid of the bad habit of using a single password for multiple Web sites. It is a console application, but it also has a simple graphical interface.

Download Website Updated 28 Jan 2014 CERTivity KeyStores Manager

Screenshot
Pop 39.20
Vit 3.41

CERTivity is a powerful multi-platform visual tool for creating, managing, and handling different key store types (such as JKS, JCEKS, PKCS12, the Bouncy Castle types BKS and UBER, and Windows Native), public, private and secret keys in different formats (PKCS, OpenSSL, RSA/DSA, etc.), certificates (version 1 and 3), and certificates chains. It allows you to import and export keys, key pairs and certificates, manage certificate extensions, extend the validity period for self-signed certificates, test certificates, obtain revocation status, convert from one key store type to another, and much more.

Download Website Updated 10 Feb 2013 Bluefog

Screenshot
Pop 59.62
Vit 1.82

Bluefog is a tool that can generate an essentially unlimited number of phantom Bluetooth devices. It can be used to test Bluetooth scanning and monitoring systems, make it more difficult for attackers to lock onto your devices, or otherwise complicate the normal operation of Bluetooth devices. Technically, Bluefog can work with just one Bluetooth adapter, but it works much better when you connect multiple adapters. Up to four radios are currently supported simultaneously.

Download Website Updated 23 Dec 2012 Username-Anarchy

Screenshot
Pop 16.82
Vit 23.30

Username-Anarchy is a commandline tool for the generation of usernames based on the users' real names. This is useful for user account/password brute force guessing and username enumeration when usernames are based on the users’ names. By attempting a few weak passwords across a large set of user accounts, user account lockout thresholds can be avoided. Common aliases (or self-chosen usernames) from forums are also included. Features include a plugin architecture, format string-style username formats, and substitutions. When only a first initial and lastname is known (LinkedIn lists users like this), it will attempt all possible first names, common first and last names from various countries (from Familypedia and PublicProfiler), and an exhaustive list of first and lastnames from Facebook. This also includes usernames scraped from forums, ordered by popularity.

No download No website Updated 15 Apr 2013 Nova: Network Anti-Reconnaissance Tool

Screenshot
Pop 90.28
Vit 1.93

Nova is a software application for preventing and detecting hostile network reconnaissance (such as nmap scans). It does this by first creating the Haystack: a large collection of low interaction honeypots using an updated version of Honeyd. Finding real machines on the network becomes like finding a needle in a haystack of fake machines. Second, Nova uses machine learning algorithms to automatically detect and classify attempts at hostile reconnaissance, so there's no need to go searching manually through your honeypot's log files. It provides an easy to use Web-based interface powered by Node.js to configure itself and Honeyd instances.

No download Website Updated 04 Mar 2014 ipdecap

Screenshot
Pop 65.38
Vit 2.24

Ipdecap can decapsulate traffic encapsulated within GRE, IPIP, 6in4, and ESP (IPSEC) protocols, and can also remove IEEE 802.1Q (virtual LAN) headers. It reads packets from a pcap file, removes the encapsulation protocol, and writes them in another pcap file.

Screenshot

Project Spotlight

AOLserver

A multithreaded, Tcl-enabled, dynamic Web server.

Screenshot

Project Spotlight

QuickMSG

A secure chat app.