Keyczar is a cryptographic toolkit designed to make it easier and safer for developers to use cryptography in their applications. It supports authentication and encryption with both symmetric and asymmetric keys. Cryptography is easy to get wrong. Developers can choose improper cipher modes, use obsolete algorithms, compose primitives in an unsafe manner, or fail to anticipate the need for key rotation. Keyczar abstracts some of these details by choosing safe defaults, automatically tagging outputs with key version information, and providing a simple programming interface.
The Cryptographic Implementations Analysis Toolkit (CIAT) is a compendium of command line and graphical tools whose aim is to help in the detection and analysis of encrypted byte sequences within files (executable and non-executable). It is particularly helpful in the forensic analysis and reverse engineering of malware using cryptographic code and encrypted payloads.
MonoDecrypt uses pattern matching and its knowledge about character frequencies in order to decrypt messages encoded with a monoalphabetic substitution cipher. MonoDecrypt can decrypt texts of any language, as long as it has sufficient information about the language. Depending on the information you give it, the tool decrypts about 50%-100% on its own. Then you can decrypt the remaining data by filling the gaps or correcting bad guesses. MonoDecrypt can also encrypt texts using monoalphabetic substitution.
TCL2FTP is an extension library for Tcl scripts which allows Tcl programs to perform FTP client and gateway actions. It fully supports the FTP/FXP protocols, is ready for use with SSL/TLS, and is compatible with glFTPd. It can run simple FTP commands, and it supports 25 simultaneous FTP sessions.
cryptod is a program that listens on a TCP port or unix socket, receives information on that port, and performs the requested action. Common actions are aes256 encrypting/decrypting, base64 encoding/decoding, and RMD160 hashing. Interfacing with the daemon is well documented, and you are also easily able to obtain statistics from the server.
Portsmith is an application-based firewall that is designed to interact with authorized users, and offers an easy-to-use browser driven interface. Portsmith's unique features include its core logic and its interface. Its logic specifies that ports are kept in a closed position until an authorized user logs into the Portsmith interface and triggers them open. When opened, the ports are only accessible from the authorized user's current IP address.
jidgen is a Java-based id generator that can be used as a command line program or as a library. The idea is to make automated generation of user IDs as easy as possible by introducing a simple, straightforward template language to describe the structure of the desired IDs. jidgen uses 100% Java and is thus platform independent. Itsupports collision filters for different backends to ensure the generated ID is unique in your environment. Blacklists are available to make sure all IDs are socially acceptable. As a command line program, it can easily be accessed by scripts or directly by the user. As an embedded library, it can easily be employed in the process of automated ID generation and suggestion.
libpwstor is a library implementing a password storage format for C programmers. This format provides a reasonable level of security by utilizing SHA-256 in addition to a random salt to mitigate dictionary and rainbow table attacks. In addition to the core functionality, libpwstor also offers some additional functions such as Base64 encoding and decoding. All functionality is implemented and designed in such a way as to be easy to use for C programmers of varying skill levels, while preserving reasonable security in the underlying storage format.