RSS 263 projects tagged "Windows"

Download Website Updated 08 Apr 2014 GNUnet

Screenshot
Pop 696.85
Vit 181.37

GNUnet is a peer-to-peer framework with focus on providing security. All peer-to-peer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP, TCP, HTTP, HTTPS, or direct 802.11 (WLAN). GNUnet supports accounting to provide contributing nodes with better service. The services built on top of the framework include anonymous file sharing and a virtual network providing IPv4-IPv6 transition via protocol translation over the P2P network.

Download No website Updated 14 Apr 2014 MatrixSSL

Screenshot
Pop 440.26
Vit 151.71

MatrixSSL is an embedded SSL and TLS implementation designed for small footprint devices and applications requiring low overhead per connection. The library is less than 50Kb on disk with cipher suites. It includes client and server support through TLS 1.2, mutual authentication, session resumption, and implementations of RSA, ECC, AES, 3DES, ARC4, SHA2, SHA1, and MD5. The source is well documented and contains portability layers for additional operating systems, cipher suites, and cryptography providers.

Download Website Updated 06 Oct 1999 P-Synch

Screenshot
Pop 29.70
Vit 72.87

P-Synch is a commercial password management toolkit which provides automated password synchronization, password strength enforcement, password self-reset by authenticated users, and streamlined password reset by helpdesk. P-Synch is available for both internal use as well as for Internet-based deployments in B2B and B2C applications.

No download Website Updated 01 Dec 2001 SecurityFocus ARIS Extractor

Screenshot
Pop 27.50
Vit 67.25

SecurityFocus ARIS Extractor is a sophisticated Intrusion Detection System (IDS) log analyzer and reporting system, integrated with the SecurityFocus ARIS web site. It allows administrators to upload Intrusion Detection System (IDS) logs to the SecurityFocus ARIS Web site, producing sophisticated reporting, and research attacks and events. By filtering out insignificant or benign data and converting it to a common (XML) format, ARIS extractor streamlines incident reporting for both security professionals and home users, allowing IDS operators to focus only on relevant attacks and incidents. It allows you to analyze and archive logged incidents, cross reference incidents/attacks with the SecurityFocus Vulnerability Database, look up contact information for offending IP addresses, generate personal incident statistics and reports, automatically identify and report important incidents, reduce the amount of time spent parsing IDS logs, and generate daily summary reports, delivered by email (optional). All of this is done without revealing any information that could be used to discern your identity. It can be configured to obfuscate IP addresses, names, and other pertinent details before submitting them to the ARIS Analyzer web site. It supports Snort, Cisco Secure IDS, Dragon, NetProwler, RealSecure, BlackICE Defender, and ICEPac.

Download No website Updated 22 Jun 2002 coinflip

Screenshot
Pop 11.40
Vit 65.72

coinflip is a cryptographically secure program/protocol for flipping coins over the Internet. It uses MD5 as a one-way hash.

No download Website Updated 17 Sep 2003 CyberFusion

Screenshot
Pop 12.77
Vit 62.19

CyberFusion is a system that provides secure file transfer across a LAN, a WAN, and the Internet. It offers encryption and security, reliability and guaranteed delivery, management and automation, audit and control. It offers cost-saving migration from competitor products such as Connect:Direct which is supported with useful tools. It may be used as part of a VPN, ERP, EAI, or ETL software solution for secure file transfers as well as in disaster recovery, data archive, and backup and restore operations.

No download Website Updated 02 Oct 2003 Yosi's Anti-Spam POP3 fIlter bot

Screenshot
Pop 10.54
Vit 62.07

yaspi (Yosi's Anti-Spam POP3 fIlter bot) is a POP3 mail-scanner specifically made to combat mail bombings caused by viruses (i.e. Swen). It connects to the POP3 server, inspects the messages, and deletes the infected ones without ever downloading them. Its most interesting feature is that it can automatically send abuse reports to the ISPs from which the infected mails originated.

Download Website Updated 24 Dec 2013 Tor

Screenshot
Pop 797.73
Vit 61.65

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Download Website Updated 01 Apr 2014 Aircrack-ng

Screenshot
Pop 638.90
Vit 61.36

aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.).

No download Website Updated 24 Jan 2004 NewPKI

Screenshot
Pop 21.26
Vit 61.14

NewPKI is a PKI based on the OpenSSL low-level API. All data is handled through a database, and there is an SQL abstraction layer available.

Screenshot

Project Spotlight

NTRU

The NTRU public-key cryptosystem.

Screenshot

Project Spotlight

SYINF

A portable, cross-platform program for brief system information.