GNU Privacy Guard DNS Keyserver Client enables sending and retrieving OpenPGP keys with GnuPG to and from DNS-based keyservers. DNS-based keyservers offer several advantages over traditional HTTP-based ones, such as distributed caching, server fail-over, and geographical optimal server selection, etc.
Knocker is a simple, versatile, and easy-to-use TCP security port scanner written in C, using threads. It is able to analyze hosts and the network services which are running on them. Knocker it is available for Linux, FreeBSD, many Unix platforms, and Windows 95/98/2000. Both a console version and a GTK+ version are available.
chntpw is a Linux utility to (re)set the password of any user that has a valid (local) account on your WinNT or Win2000 system, by modifying the crypted password in the registry's SAM file. You do not need to know the old password to set a new one. It works offline (i.e., you have to shutdown your computer and boot off a linux floppy disk). The bootdisk includes stuff to access NTFS partitions and scripts to glue the whole thing together. This utility works with SYSKEY and includes the option to turn it off. A bootdisk image is provided.
IPFC is software and a framework to monitor multiple types of agents in a heterogeneous distributed environment. Agents can implement logging of elements as diverse as packet filters (like netfilter, pf, ipfw, IP Filter, checkpoint FW1, etc.), NIDS (Snort, arpwatch, etc.), Web servers, and other general devices (from syslog-servers to embedded devices). It features log collection for different security "agents", dynamic log correlation possibilities, and easy extensibility due to the generic database and XML message formats used.
The SLAN project is focused on developing a flexible open source Virutal Private Networking system, primarily for securing Internet uplinks which use broadcast media such as 802.11 wireless links or public/shared ethernets. The system is flexible enough to support traditional VPN applications as well. As well as featuring an open design and strong security, the SLAN project hopes to eventually provide support for all major computing platforms.
CDSA stands for Common Data Security Architecture. It provides a security framework that includes cryptographically signed modules to present an abstracted unified API to the application developer to perform cryptographic and security related operations. It also includes hardware support for cryptographic tokens and biometric devices, such as thumbprint scanners. Intel has implemented the CDSA 2 specification and released it as open source.
SecurityFocus ARIS Extractor is a sophisticated Intrusion Detection System (IDS) log analyzer and reporting system, integrated with the SecurityFocus ARIS web site. It allows administrators to upload Intrusion Detection System (IDS) logs to the SecurityFocus ARIS Web site, producing sophisticated reporting, and research attacks and events. By filtering out insignificant or benign data and converting it to a common (XML) format, ARIS extractor streamlines incident reporting for both security professionals and home users, allowing IDS operators to focus only on relevant attacks and incidents. It allows you to analyze and archive logged incidents, cross reference incidents/attacks with the SecurityFocus Vulnerability Database, look up contact information for offending IP addresses, generate personal incident statistics and reports, automatically identify and report important incidents, reduce the amount of time spent parsing IDS logs, and generate daily summary reports, delivered by email (optional). All of this is done without revealing any information that could be used to discern your identity. It can be configured to obfuscate IP addresses, names, and other pertinent details before submitting them to the ARIS Analyzer web site. It supports Snort, Cisco Secure IDS, Dragon, NetProwler, RealSecure, BlackICE Defender, and ICEPac.
The Generic Software Wrappers Toolkit allows you to wrap closed-source applications to constrain or transform their behavior. Wrappers are written that intercept system calls and other system events, and allow you to deny, transform, log, or augment the system events. They are written in a custom language that abstracts away many of the gritty issues, allowing the wrapper author to concentrate on policy. Sample wrappers include dbfencrypt, which provides transparent access to "encrypted" files; controlledx, which limits the programs a process can execute; and id-seq, a trainable sequence-based intrusion detection wrapper.