FTimes is a system baselining and evidence collection tool. Its primary purpose is to gather and/or develop topographical information and attributes about specified directories and files in a manner conducive to intrusion and forensic analysis. It was designed to support the following initiatives: content integrity monitoring, incident response, intrusion analysis, and computer forensics.
Jacksum is a platform-independent utility for computing and verifying checksums, CRCs, and message digests, as well as timestamps of files. It supports most common checksum algorithms. The format of the output is fully customizable. The program is large-file-aware, and recursive file processing as well as platform-independent file verification are supported.
Soffid IAM offers a complete and integrated solution for controlling access to enterprise applications. It provides you with everything you need to obtain accurate information about who uses your systems, manage the whole user provisioning lifecycle, and bring users an enhanced experience by removing the need to enter credentials every time they access your business applications. It provides a single point of audit and control for assessing data security regulatory compliance.
Akeni Instant Messaging Server Pro is a client/server instant messaging platform that allows companies to host their own secured private IM system. The client has an user interface similar to AIM, ICQ, or MSN Messenger. It supports all the standard IM features such as chat, group conference, presence management, file transfer, offline messages, and emergency alert/notification. Extra features include contact management and optional tabbed chat sessions. The server has advanced administration tools for managing user accounts, client-side logging capabilities, and peer-to-peer file transfers. It can be set up on a private network without connecting to the Internet, and can easily be set up for use inside and outside of the company firewall.
DieHard automatically hardens software applications against a wide range of bugs. These bugs, known as memory errors, often end up as serious security vulnerabilities, cause crashes, or lead to unpredictable behavior. DieHard either eliminates these bugs altogether, or avoids them with high probability.
creepy is an application that allows you to gather geolocation related information about users from social networking platforms and image hosting services. The information is presented in a map inside the application where all the retrieved data is shown, accompanied with relevant information (i.e. what was posted from that specific location) to provide context to the presentation.
pyHIDS is a host-based intrusion detection system. It uses an RSA signature to check the integrity of its database. Alerts are written in the logs of the system, and can be sent via email to a list of users or on IRC channels (through the irker IRC client). You can define rules to specify files to be checked periodically.
Lasso (Liberty Alliance Single Sign On) is an implementation of the Liberty Alliance specifications. These specifications define protocols for federated identities, single sign-on, etc. Lasso supports ID-FF 1.2, SAML 2.0, and parts of ID-WSF. It provides both a C library and bindings for several languages (Python, Java, Perl, PHP 4, and PHP 5).