1971 projects tagged "Security"

No download Website Updated 11 Aug 2008 Keyczar

Screenshot
Pop 22.80
Vit 1.00

Keyczar is a cryptographic toolkit designed to make it easier and safer for developers to use cryptography in their applications. It supports authentication and encryption with both symmetric and asymmetric keys. Cryptography is easy to get wrong. Developers can choose improper cipher modes, use obsolete algorithms, compose primitives in an unsafe manner, or fail to anticipate the need for key rotation. Keyczar abstracts some of these details by choosing safe defaults, automatically tagging outputs with key version information, and providing a simple programming interface.

No download Website Updated 17 Aug 2008 xbasics FireHash

Screenshot
Pop 22.72
Vit 1.00

xbasics FireHash helps test the integrity of any file through the generation of checksums/hashes. It provides a simple, yet effective way for generating cryptographic hashes based on many different standard algorithms, including MD5 and SHA512, among many others.

Download Website Updated 18 Aug 2008 Cryptographic Implementations Analysis Too...

Screenshot
Pop 33.70
Vit 1.00

The Cryptographic Implementations Analysis Toolkit (CIAT) is a compendium of command line and graphical tools whose aim is to help in the detection and analysis of encrypted byte sequences within files (executable and non-executable). It is particularly helpful in the forensic analysis and reverse engineering of malware using cryptographic code and encrypted payloads.

Download Website Updated 21 Aug 2008 MonoDecrypt

Screenshot
Pop 16.88
Vit 1.00

MonoDecrypt uses pattern matching and its knowledge about character frequencies in order to decrypt messages encoded with a monoalphabetic substitution cipher. MonoDecrypt can decrypt texts of any language, as long as it has sufficient information about the language. Depending on the information you give it, the tool decrypts about 50%-100% on its own. Then you can decrypt the remaining data by filling the gaps or correcting bad guesses. MonoDecrypt can also encrypt texts using monoalphabetic substitution.

No download Website Updated 22 Aug 2008 hasher

Screenshot
Pop 20.00
Vit 1.00

hasher is a secure package buliding tool for RPM packages and also ultra-light virtualization technology.

Download Website Updated 05 Sep 2008 TCL2FTP

Screenshot
Pop 26.23
Vit 1.00

TCL2FTP is an extension library for Tcl scripts which allows Tcl programs to perform FTP client and gateway actions. It fully supports the FTP/FXP protocols, is ready for use with SSL/TLS, and is compatible with glFTPd. It can run simple FTP commands, and it supports 25 simultaneous FTP sessions.

Download No website Updated 12 Sep 2008 Crypto Server

Screenshot
Pop 21.56
Vit 1.00

cryptod is a program that listens on a TCP port or unix socket, receives information on that port, and performs the requested action. Common actions are aes256 encrypting/decrypting, base64 encoding/decoding, and RMD160 hashing. Interfacing with the daemon is well documented, and you are also easily able to obtain statistics from the server.

Download Website Updated 15 Oct 2008 Portsmith

Screenshot
Pop 25.81
Vit 1.00

Portsmith is an application-based firewall that is designed to interact with authorized users, and offers an easy-to-use browser driven interface. Portsmith's unique features include its core logic and its interface. Its logic specifies that ports are kept in a closed position until an authorized user logs into the Portsmith interface and triggers them open. When opened, the ports are only accessible from the authorized user's current IP address.

Download Website Updated 16 Oct 2008 jigden

Screenshot
Pop 15.94
Vit 1.00

jidgen is a Java-based id generator that can be used as a command line program or as a library. The idea is to make automated generation of user IDs as easy as possible by introducing a simple, straightforward template language to describe the structure of the desired IDs. jidgen uses 100% Java and is thus platform independent. Itsupports collision filters for different backends to ensure the generated ID is unique in your environment. Blacklists are available to make sure all IDs are socially acceptable. As a command line program, it can easily be accessed by scripts or directly by the user. As an embedded library, it can easily be employed in the process of automated ID generation and suggestion.

Download Website Updated 23 Oct 2008 libpwstor

Screenshot
Pop 25.57
Vit 1.00

libpwstor is a library implementing a password storage format for C programmers. This format provides a reasonable level of security by utilizing SHA-256 in addition to a random salt to mitigate dictionary and rainbow table attacks. In addition to the core functionality, libpwstor also offers some additional functions such as Base64 encoding and decoding. All functionality is implemented and designed in such a way as to be easy to use for C programmers of varying skill levels, while preserving reasonable security in the underlying storage format.

Screenshot

Project Spotlight

wcd

Another Norton Change Directory (NCD) clone with more features.

Screenshot

Project Spotlight

pmcyg

A tool for creating customized Cygwin installers.