1971 projects tagged "Security"

Download Website Updated 03 Sep 2003 Covert Channel Tunneling Tool

Screenshot
Pop 39.50
Vit 1.75

Covert Channel Tunneling Tool (CCTT) is a tool presenting several exploitation techniques allowing the creation of arbitrary data transfer channels in the data streams authorized by a network access control system.

No download Website Updated 13 Dec 2005 SecureServ

Screenshot
Pop 82.00
Vit 3.61

SecureServ is an IRC trojan detector. It's much like a virus scanner, but aimed at IRC networks. Using several methods, including version checks, behavior analysis, and general pattern matching, it aims to detect trojans, viruses, and floodbots which connect to your IRC network. Its "brains" are based on a "Definition file" which contains information on how to detect trojans. To update detection for new trojans, you only have to download a new file.

No download Website Updated 09 Aug 2003 python-crack

Screenshot
Pop 27.75
Vit 1.75

python-crack is a module that provides to Python programs the ability to evaluate password strength. It uses the well known cracklib toolkit, hence the name.

Download Website Updated 26 Aug 2003 shellforge

Screenshot
Pop 45.52
Vit 1.75

shellforge enables you to write shellcode programs in C. It transforms C program code into shellcode that will run on a Linux/x86 system. It provides macros to substitute libc calls with direct system calls and a Python script to automate compilation, extraction, encoding, and tests.

Download Website Updated 30 May 2003 Access Control Designer

Screenshot
Pop 46.03
Vit 1.00

Access Control Designer is a universal modular tool for visually designing access control policies. The user of this system depicts requirements for the designed security policy in a graphical notation based on a generally accepted security model. The tool will then generate a configuration of security mechanisms, which will be used for the implementation of the security policy. Modularity of the tool will allow users to design security policies for a lot of various environments - systems needed to have access controlled. A pluggable module API allows third-party programmers to provide ACD modules for systems and so allow users to use ACD for designing access control policies for the systems.

Download Website Updated 08 Apr 2013 GNU Shishi

Screenshot
Pop 110.80
Vit 14.90

Shishi is a (still incomplete) implementation of Kerberos 5, which can be used to authenticate users in distributed systems. It contains a library that can be used by application developers, and a command line utility for users. Shishi supports Kerberos authenticated telnet client/server, IMAP client/server (via GSSAPI), SSH client/server (via GSSAPI), rsh/rlogin client, and a PAM module for host security.

Download Website Updated 15 Nov 2011 GNU Generic Security Service Library

Screenshot
Pop 112.93
Vit 8.00

Generic Security Service (GSS) is an implementation of the Generic Security Service API (GSSAPI). It is used by network applications to provide security services, such as authenticating SMTP/IMAP, via the GSSAPI SASL mechanism. It consists of a library and a manual, and a Kerberos 5 mechanism that supports mutual authentication and the DES and 3DES ciphers.

Download Website Updated 10 Oct 2003 initscripts-vpn

Screenshot
Pop 20.45
Vit 1.44

initscripts-vpn is a "plugin" for Red Hat Linux systems that allows you to easily create secure, encrypted tunnels between routers. It uses SSH for the encryption and PPP for the tunnel. These two pieces of software are almost always installed on any Linux system. The package integrates into Red Hat's initscripts and won't work without it. The modified initscripts-generic package is needed to use initscripts-vpn.

No download Website Updated 07 Jun 2003 ReVirt

Screenshot
Pop 23.54
Vit 1.00

ReVirt is part of the CoVirt project, which investigated on the use of virtual machines to provide security in an operating-system-independent manner to enable the security system to function independently from the guest operating system. ReVirt logs enough information to replay the entire intrusive sequence instruction-by-instruction so that a detailed observation on the attack can be documented. It includes a system called BackTracker that helps system administrators understand (and thereby recover from) an intrusion, by automatically identifying potential sequences of steps that occurred in an intrusion. Starting with a single detection point (e.g., a suspicious file), BackTracker identifies files and processes that could have affected that detection point and displays chains of events in a dependency graph.

Download Website Updated 23 Jun 2003 NetEclipse

Screenshot
Pop 27.93
Vit 1.42

NetEclipse is a suite of tools created for testing TCP/IP weaknesses and using them in a non-conventional way, such as testing security and limits of IP version 4 protocols. This project will include a sniffer, a TCP hijacker, an ARP poisoner and a TCP tunnel through ICMP/IGMP packets. Only the sniffer is currently complete.

Screenshot

Project Spotlight

AOLserver

A multithreaded, Tcl-enabled, dynamic Web server.

Screenshot

Project Spotlight

QuickMSG

A secure chat app.