RSS 353 projects tagged "Windows"

Download No website Updated 23 Feb 2001 Harm

Screenshot
Pop 29.60
Vit 69.31

Harm acts as a four-way socket redirector that allows you to effectively make a TCP connection from the Internet to a host behind a Linux masquerade-style firewall. The server (behind the firewall) makes connections to the client (on the Internet). After a successful connection, it will bounce packets from a telnet client (Windows and Linux) to the Harm client, to the Harm server (Linux only), or to the telnet daemon behind the firewall.

No download Website Updated 16 Aug 2001 Remote Methode Call

Screenshot
Pop 11.09
Vit 68.05

Remote Methode Call is a project to enable calls to methods in remote C++ classes. The transport is implemented as a library, and is free from dealing with the internal RMC stuff, so any C/C++ programmer is able to write a transport for his own purpose. RMC(2) currently has a sockets transport library as reference implementation. It is developed on Linux, and supports Linux on iX86 and PPC. RMC should also work on BeOS. Testers and developers are welcome to the project.

No download Website Updated 01 Dec 2001 SecurityFocus ARIS Extractor

Screenshot
Pop 27.50
Vit 67.26

SecurityFocus ARIS Extractor is a sophisticated Intrusion Detection System (IDS) log analyzer and reporting system, integrated with the SecurityFocus ARIS web site. It allows administrators to upload Intrusion Detection System (IDS) logs to the SecurityFocus ARIS Web site, producing sophisticated reporting, and research attacks and events. By filtering out insignificant or benign data and converting it to a common (XML) format, ARIS extractor streamlines incident reporting for both security professionals and home users, allowing IDS operators to focus only on relevant attacks and incidents. It allows you to analyze and archive logged incidents, cross reference incidents/attacks with the SecurityFocus Vulnerability Database, look up contact information for offending IP addresses, generate personal incident statistics and reports, automatically identify and report important incidents, reduce the amount of time spent parsing IDS logs, and generate daily summary reports, delivered by email (optional). All of this is done without revealing any information that could be used to discern your identity. It can be configured to obfuscate IP addresses, names, and other pertinent details before submitting them to the ARIS Analyzer web site. It supports Snort, Cisco Secure IDS, Dragon, NetProwler, RealSecure, BlackICE Defender, and ICEPac.

Download Website Updated 13 Mar 2002 Network And Service Monitoring System

Screenshot
Pop 30.69
Vit 66.50

Network and Service Monitoring System is a tool for assisting network administrators in managing and monitoring the activities of their network. It helps in getting the status information of critical processes running at any machine in the network. It can be used to monitor the bandwidth usage of individual machines in the network. It also performs checks for IP-based network services like POP3, SMTP, NNTP, FTP, etc., and can give you the status of the DNS server. The system uses MySQL for storing the information, and the output is displayed via a Web interface.

Download Website Updated 26 May 2002 Sirid

Screenshot
Pop 22.58
Vit 65.94

Sirid is a Web-based tool for managing software projects. The main features of Sirid are assigning tasks between the personnel, reporting bugs, managing specifications, and recording feature requests. The program also sends notifications of new bugs and tasks to people who have been set responsible for them, and notifies the responsible people when the deadline of some bug or task is approaching. It features graphical presentations for tracking the progress of your project. Sirid keeps you informed of the status of each of your projects, and allows you to take action if difficulties arise.

Download Website Updated 24 Dec 2013 Tor

Screenshot
Pop 792.74
Vit 61.39

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Download No website Updated 31 May 2004 CodeSeeker

Screenshot
Pop 22.32
Vit 60.10

CodeSeeker is an application level firewall and intrusion detection system that is not a packet proxy, but rather a plugin to the TCP stack itself. This means it can integrate with switched, high bandwidth sites and even inspect SSL-protected traffic.

Download Website Updated 01 Apr 2014 Aircrack-ng

Screenshot
Pop 640.13
Vit 59.81

aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.).

No download Website Updated 04 Jun 2010 Asynchronous DNS Resolver for Haskell

Screenshot
Pop 26.00
Vit 58.96

Asynchronous DNS Resolver for Haskell is a library that provides an asynchronous DNS resolver on top of GNU ADNS. Not all options are supported, but A, MX, and PTR lookups work nicely. There is also support for retrieving generic RR types, CNAMEs, and for NSEC zone walking. The library can be expected to work with fine ADNS 1.4 or later. It might also work with version ADNS 1.3, but that hasn’t been tested.

Download Website Updated 08 Oct 2013 S tar

Screenshot
Pop 548.70
Vit 58.63

Star is a very fast, POSIX-compliant tar archiver, maintained for more than 30 years. It saves many files together into a single tape or disk archive, and can restore individual files from the archive. It includes command line interfaces for the "tar", "Sun-Tar", "cpio", "pax", and "gnutar" command-line syntax. It includes a FIFO for speed, a pattern matcher, multi-volume support, the ability to archive sparse files and ACLs, the ability to archive extended file flags, automatic archive format detection, automatic byte order recognition, automatic archive compression/decompression, remote archives, and special features that allow star to be used for full and incremental backups. It includes the only known platform independent "rmt" server program.

Screenshot

Project Spotlight

Mover

An encrypted mail system.

Screenshot

Project Spotlight

pydiction

A program that allows users to auto-complete Python code in Vim.