RSS 282 projects tagged "Unix"

Download No website Updated 14 Apr 2014 MatrixSSL

Screenshot
Pop 409.04
Vit 191.47

MatrixSSL is an embedded SSL and TLS implementation designed for small footprint devices and applications requiring low overhead per connection. The library is less than 50Kb on disk with cipher suites. It includes client and server support through TLS 1.2, mutual authentication, session resumption, and implementations of RSA, ECC, AES, 3DES, ARC4, SHA2, SHA1, and MD5. The source is well documented and contains portability layers for additional operating systems, cipher suites, and cryptography providers.

Download No website Updated 10 Apr 2014 Lynis

Screenshot
Pop 1,805.57
Vit 123.99

Lynis is an auditing and hardening tool for Unix derivatives like Linux/BSD/Solaris. It scans systems to detect software and security issues. Besides security-related information, it will also scan for general system information, installed packages, and possible configuration mistakes. The software is aimed at assisting automated auditing, software patch management, and vulnerability and malware scanning of Unix-based systems.

Download Website Updated 03 Mar 2014 GNU Transport Layer Security Library

Screenshot
Pop 1,287.44
Vit 122.47

GnuTLS is a secure communications library implementing the SSL, TLS, and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols, as well as APIs to parse and write X.509, PKCS #12, OpenPGP, and other required structures. It is intended to be portable and efficient with a focus on security and interoperability.

No download Website Updated 11 Apr 2014 OpenDNSSEC

Screenshot
Pop 229.31
Vit 66.91

OpenDNSSEC is software that manages the security of domain names on the Internet. The project intends to drive adoption of Domain Name System Security Extensions (DNSSEC) to further enhance Internet security.

Download Website Updated 19 Jan 2002 LogHog

Screenshot
Pop 26.04
Vit 66.87

Loghog was designed to take a proactive stance on snort output. It supports multilog processing and is optimized for high volume traffic. It responds to events by conducting actions such as various forms of email notification and blocking via ipchains, iptables, or ipfw.

No download Website Updated 21 Feb 2002 Router Audit Tool

Screenshot
Pop 37.88
Vit 66.62

The Router Audit Tool (rat) downloads configurations of router devices running IOS to be audited, and then checks them against the settings defined in the benchmark. For each configuration examined, it produces a report listing the following: a list of each rule checked with a pass/fail score, a raw overall score, a weighted overall score (1-10), and a list of IOS commands that will correct problems identified.

Download Website Updated 26 Feb 2002 Makejail

Screenshot
Pop 20.74
Vit 66.58

Makejail employs short configuration files to help administrators create and maintain chroot jails. Makejails attempts to guess which files are required by the daemon, and installs all these files into the jail.

Download No website Updated 22 Jun 2002 coinflip

Screenshot
Pop 11.14
Vit 65.71

coinflip is a cryptographically secure program/protocol for flipping coins over the Internet. It uses MD5 as a one-way hash.

Download Website Updated 13 Feb 2003 pam_eps

Screenshot
Pop 20.98
Vit 63.89

pam_eps is a PAM module that allows you to authenticate users against a remote server with a ssh daemon enabled. If the user exists in local machine, he is allowed entry. But if the user doesn't exist (yet exists in the remote machine and the password supplied is correct), a new user with that pass and logname will be created.

No download Website Updated 17 Sep 2003 CyberFusion

Screenshot
Pop 13.71
Vit 62.18

CyberFusion is a system that provides secure file transfer across a LAN, a WAN, and the Internet. It offers encryption and security, reliability and guaranteed delivery, management and automation, audit and control. It offers cost-saving migration from competitor products such as Connect:Direct which is supported with useful tools. It may be used as part of a VPN, ERP, EAI, or ETL software solution for secure file transfers as well as in disaster recovery, data archive, and backup and restore operations.

Screenshot

Project Spotlight

ddpt

A dd command variant for disks with large I/O support.

Screenshot

Project Spotlight

Synth

A powerful C++ templating framework.