RSS 19 projects tagged "Windows"

Download No website Updated 12 Dec 2013 Soffid IAM

Screenshot
Pop 78.31
Vit 2.73

Soffid IAM offers a complete and integrated solution for controlling access to enterprise applications. It provides you with everything you need to obtain accurate information about who uses your systems, manage the whole user provisioning lifecycle, and bring users an enhanced experience by removing the need to enter credentials every time they access your business applications. It provides a single point of audit and control for assessing data security regulatory compliance.

Download Website Updated 20 Nov 2013 Random Wordlist Generator

Screenshot
Pop 39.80
Vit 12.28

Random Wordlist Generator is a simple multiplatform tool which allows you to create a wordlist of random words. You can generate random words using different sets of characters. With a mouse click, you can generate thousands of different words in a few minutes.

No download Website Updated 23 Jul 2013 pyHIDS

Screenshot
Pop 75.21
Vit 2.51

pyHIDS is a host-based intrusion detection system. It uses an RSA signature to check the integrity of its database. Alerts are written in the logs of the system, and can be sent via email to a list of users or on IRC channels (through the irker IRC client). You can define rules to specify files to be checked periodically.

Download Website Updated 06 Jun 2013 Moscrack

Screenshot
Pop 80.89
Vit 6.04

Moscrack is a WPA cracker for use on clusters. It supports MOSIX, SSH, and RSH connectivity and works by reading a word list from STDIN or a file, breaking it into chunks, and passing those chunks off to separate processes that run in parallel. The parallel processes are then executed on different nodes in your cluster. All results are checked and recorded on your master node. Logging and error handling are taken care of. It is capable of running reliably for long periods of time, without the risk of losing data or having to restart. Moscrack uses aircrack-ng by default. Pyrit for WPA cracking and Dehasher for Unix password hashes are supported via plugins.

Download Website Updated 13 Apr 2013 jEncrypt

Screenshot
Pop 21.07
Vit 19.35

jEncrypt is a commandline file encryption archiver. Files are encrypted with the AES-CTR mode, which was recommended by the National Institute of Standards and Technology in 2001 (NIST SP 800-38A). AES-CTR mode only provides confidentiality. It requires a message authentication code such as CBC-MAC to ensure an encrypted message is not accidentally modified or maliciously tampered with, which jEncrypt currently does not provide.

Download Website Updated 05 Feb 2013 Netzob

Screenshot
Pop 104.43
Vit 2.55

Netzob supports the expert in reverse engineering, evaluation, and simulation of communication protocols. Its main goals are to help security evaluators to assess the robustness of proprietary or unknown protocol implementations, simulate realistic communications to test third-party products (IDS, firewalls, etc.), and create an Open Source implementation of a proprietary or unknown protocol. Netzob provides a semi-automatic inferring process, and includes everything necessary to passively learn the vocabulary of a protocol and actively infer its grammar. The learnt protocol can afterward be simulated. Netzob handles text protocols (like HTTP and IRC), fixed field protocols (like IP and TCP), and variable field protocols (like ASN.1-based formats).

Download Website Updated 21 Jul 2012 ImmediateCrypt

Screenshot
Pop 51.19
Vit 1.48

ImmediateCrypt can easily encrypt and decrypt plain text messages with the AES-256 algorithm (CBC block chaining, PKCS5 padding).

Download Website Updated 28 Jun 2012 mod_auth_pubtkt

Screenshot
Pop 33.47
Vit 4.06

mod_auth_pubtkt is a simple Web single sign-on (SSO) solution for Apache. It validates authentication tickets provided by the client in a cookie using public-key cryptography (DSA or RSA). Thus, only the login server that generates the tickets needs to possess the private key, while Web servers can verify tickets given only the public key. The implementation of the login server is left to the user, but an example and a library in PHP are provided with the distribution.

Download Website Updated 14 Jun 2012 FortNotes

Screenshot
Pop 20.86
Vit 25.98

FortNotes is an online password manager. All the records created with it are immediately encrypted in the Web browser with AES, and only then are sent to the server. The process is transparent and fully automated. It's only necessary to enter the password.

No download Website Updated 08 Feb 2012 creepy

Screenshot
Pop 87.58
Vit 3.81

creepy is an application that allows you to gather geolocation related information about users from social networking platforms and image hosting services. The information is presented in a map inside the application where all the retrieved data is shown, accompanied with relevant information (i.e. what was posted from that specific location) to provide context to the presentation.

Screenshot

Project Spotlight

J!Research

A Joomla extension for management of research-related work.

Screenshot

Project Spotlight

CoreTML framework

A tool allowing the developer to create user-configurable source code templates.