RSS 35 projects tagged "Windows"

Download Website Updated 30 May 2013 John the Ripper

Screenshot
Pop 1,495.12
Vit 27.03

John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, lots of other hashes and ciphers are added in the community-enhanced version (-jumbo), and some are added in John the Ripper Pro.

Download Website Updated 18 Jan 2014 Disk ARchive

Screenshot
Pop 992.05
Vit 50.12

Dar is a shell command that makes backup of a directory tree and files. Its features include splitting archives over several files, DVD, CD, ZIP, or floppies, compression, full or differential backups, strong encryption, proper saving and restoration of hard links, extended attributes, file forks, Door inodes, and sparse files, remote backup using pipes and external commands (such as ssh), and rearrangement of the "slices" of an existing archive. It can run commands between slices, before and after saving some defined files or directories (for a proper database backup, for example), and quickly retrieve individual files from differential and full backups. Several external GUIs exist as alternatives to its CLI interface, like kdar, DarGUI, SaraB, etc.

Download Website Updated 24 Dec 2013 Tor

Screenshot
Pop 805.92
Vit 62.15

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Download Website Updated 16 Jan 2012 p0f

Screenshot
Pop 588.13
Vit 8.97

p0f is a versatile passive OS and application fingerprinter, and a tool for detecting NAT/connection sharing. It is useful for penetration testing, routine network monitoring, and forensics, and to aid abuse detection tools such as IDSes, spam filters, or honeypots.

Download Website Updated 15 Aug 2011 GMime

Screenshot
Pop 242.26
Vit 15.35

GMime is a C/C++ library for parsing and creating messages using the Multipurpose Internet Mail Extension (MIME).

No download Website Updated 07 May 2001 Alamin GSM SMS Gateway

Screenshot
Pop 210.80
Vit 2.73

The Alamin GSM SMS Gateway is a group of daemons that allows you to send/receive SMS messages from any GSM device that supports AT+ commands (GSM modems or GSM mobile phones) or supported by Gnokii. A client program allows you to send messages from any IP client. An SMTP interface is provided to allow MTAs to send SMS directly to the GSM network. IMP (Incoming Message Processor) modules allows you to extend functionality to implement banking, network administration, bd querys, etc. from a GSM mobile phone.

Download Website Updated 17 Sep 2004 Lepton's Crack

Screenshot
Pop 203.70
Vit 2.18

Lepton's Crack is a generic password cracker. It is easily-customizable with a simple plugin system and allows system administrators to review the quality of the passwords being used on their systems. It can perform a dictionary-based (wordlist) attack as well as a brute force (incremental) password scan, including the use of regular expressions. It supports standard MD4 hash, standard MD5 hash, NT MD4/Unicode, Lotus Domino HTTP password (R4), and SHA-1 hash formats. LM (LAN Manager) plus appending and prepending of characters is available in the Development branch (strongly recommended).

Download Website Updated 29 May 2012 GNU SASL

Screenshot
Pop 201.59
Vit 12.93

GNU SASL is an implementation of the Simple Authentication and Security Layer framework and a few common SASL mechanisms. SASL is used by network servers such as IMAP and SMTP to request authentication from clients, and in clients to authenticate against servers. The library includes support for the SASL framework (with authentication functions and application data privacy and integrity functions) and at least partial support for the CRAM-MD5, EXTERNAL, GSSAPI, ANONYMOUS, PLAIN, SECURID, DIGEST-MD5, LOGIN, NTLM, and KERBEROS_V5 mechanisms.

Download Website Updated 30 Mar 2011 snortalog

Screenshot
Pop 180.78
Vit 9.37

Snortalog is a powerful Perl script that summarizes Snort logs, making it easy to view any network attacks detected by Snort. It can generate charts in HTML, PDF, and text output. It works with all versions of Snort, and can analyze logs in three formats: syslog, fast, and full snort alerts. Moreover, it is able to summarize other logs like CheckPoint, Netfilter, IPFilter, Packet Filter, Cisco PIX/ASA, NetScreen, TippingPoint, and Lucent BRICK in a similar way.

Download Website Updated 16 Jun 2009 TrueCrypt

Screenshot
Pop 159.92
Vit 4.95

TrueCrypt is on-the-fly disk encryption software that can create a virtual encrypted disk within a file and mount it as a real disk. It can also encrypt an entire hard disk partition, or a storage device such as USB memory stick. It supports plausible deniability.

Screenshot

Project Spotlight

Dada Mail

A simple, Web-based mailing list manager.

Screenshot

Project Spotlight

coreBOS

A business empowering tool and adaptable software program.