Open source disk encryption with strong security for the Paranoid
VeraCrypt is a free disk encryption software brought to you by IDRIX (https://www.idrix.fr) and based on TrueCrypt 7.1a. It adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. It also solves many vulnerabilities and security issues found in TrueCrypt. This enhanced security adds some delay ONLY to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much harder for an attacker to gain access to the encrypted data. All released files are PGP signed with key ID=0x54DDD393, available on key servers and downloadable at https://www.idrix.fr/VeraCrypt/VeraCrypt_PGP_public_key.asc VeraCrypt can mount TrueCrypt volumes. It also can convert them to VeraCrypt format. Documentation: https://www.veracrypt.fr/en/Documentation.html FAQ : https://www.veracrypt.fr/en/FAQ.html
Tools to work with android .dex and java .class files
Mirrors: * https://bitbucket.org/pxb1988/dex2jar * https://github.com/pxb1988/dex2jar dex2jar contains following compment * dex-reader is designed to read the Dalvik Executable (.dex/.odex) format. It has a light weight API similar with ASM. * dex-translator is designed to do the convert job. It reads the dex instruction to dex-ir format, after some optimize, convert to ASM format. * dex-ir used by dex-translator, is designed to represent the dex instruction dex-tools tools to work with .class files. * d2j-smali disassemble dex to smali files and assemble dex from smali files. different implementation to smali/baksmali, same syntax, but we support escape in type desc "Lcom/dex2jar\t\u1234;" * dex-writer write dex same way as dex-reader.
OPTOSS Next Gen Network Management System (NG-NetMS)
Why to pay tens of thousands $$$ for your network management software? Get visibility into your networks and complex processes inside with NG-NetMS now! NG-NetMS is a new end-to-end network management platform for your Linux servers, Cisco, Juniper, HP and Extreme routers, switches and firewalls. NG-NetMS is precise, quick and efficient. It collects most complete information about the network inventory, topology, map of IPv4 addresses quickly and with minimum hassle. Most important you will be able to collect, process and analyse Syslog events and SNMP alarms both in near-real-time and from the historical archives in a new way. We successfully used NG-NetMS for delivery of network assessment services for our customers worldwide for many years. And now we want to share this unique and fully functional tool with community. It is not capped in terms of performance or number of nodes. The only limit is the hardware you deploy it on. http://www.opt-net.eu/products
OtrosLogViewer download page
OtrosLogViewer is hosted on https://github.com/otros-systems/otroslogviewer. On sf.net you can download distribution pacakges.
Windows 8 Screen Lock and Powerful Security Solution for Windows 7
What does WinlockPro do? Brings the entire Windows 10 metro theme across all versions of windows(XP and above) Proprietary password encryption technology Flash Drive Unlock! View login attempts that have occurred Sends you an email if many failed attempts occur Shuts down the computer if multiple failed attempts occur Desktop widget which can be used to easily control all aspects of the software Ability to leave notes on the Lock Screen interface Extremely simple to use Almost every small aspect of the software can be customized Fonts, colors, styles, positions, wallpapers, avatars, EVERYTHING can be changed to your liking Now has a minimalist mode, to make it even easier to use Dual monitor support G-mail integration - Ability to control WinlockPro with simple email commands. A whole lot more to be discovered Future I am currently building a cross platform app that will allow users to control WinlockPro from their mobile phones.
httest is a script based tool for testing and benchmarking web applications, web servers, proxy servers and web browsers. httest can emulate clients and servers in the same test script, very useful for testing proxys.
Web Security Gateway (URL filtering, waf, firewall, antivirus...)
CacheGuard is an Enterprise Grade Web Security Gateway providing firewall, web antivirus, caching, web compression, URL filtering, forward/reverse proxy, web load balancing, WAF, antivirus, bandwidth shaping and more. The High Availability function is the the heart of CacheGuard using RAID, link bounding, VRRP, cache sharing. An SNMP agent is integrated into the appliance and the appliance can send traps if something goes wrong. CacheGuard is available as an OS appliance to install on a hardware or virtual machine of your choice. You can implement it transparently in any existing architecture as your main central point where all the Web traffic passes through. CacheGuard is based on a hardened Linux system built from scratch (with LFS) and integrates netfilter and iproute2, squid, squidGuard, apache, modSecurity, clamAV and multiple other open source products interfaced together as a whole to allow an easy and straightforward configuration using the CLI or the Web GUI.
cross-platform, encryption application
encrypt is a multi-platform, file encryption application. Binary packages are currently provided for Arch, Debian, Fedora, MS Windows, Android and OS X. For further details, including the latest source code, visit https://albinoloverats.net/projects/encrypt
Apache HTTPD Server is an open source web server packaged as a portable app, so you can run a full web server on your iPod, USB flash drive, portable hard drive, etc. It has all the same features as Apache HTTPD, plus, it leaves no personal information behind on the machine you run it on, so you can take it with you wherever you go.
Simple but Powerful, Cross-Platform Password Management Utility
A simple but powerful cross-platform utility for managing and accessing your most secret data. It stores passwords and whole files, so it can literally store any information you want to keep secret. Access your most-used passwords/URLs right out of a desktop tray icon. For advanced users, it includes a separate utility called Grypto-Transforms, which has a universal hash calculator with all the major hash functions, generic encrypt/decrypt functions and a base64/hex converter. Although the interface is simple and intuitive, the security is top-notch. It uses AES with CCM to secure and authenticate the data.
RTOS for Secure Systems
Pharos is a Real-Time Operating System designed for Secure Systems with the following characteristics: -Security: With space partitions and enhanced time partitioning. Each partition protected with hardware Memory Management Unit and operating in user mode. -Quality: Considering requirements from the most strict standards, Cyclomatic Number, Nesting Levels, Comments and MISRA rules. -Mixed Criticality: Provides independence and the isolation of each partition and provides native support for sporadic, periodic and aperiodic threads under a fixed-priority preemptive scheduler, including WCET protection. -Determinism: Hard real-time determinism, calls are time limited and are, in a few cases, maximized to O(Log(N)) of the number of objects in the system. We are a group of enthusiastic software developers that also implements client custom software. Contact: firstname.lastname@example.org
Lock your files and folders .
Simply lock and unlock your files and folders.
Security Assessment Data Management and Analysis Tool
Sagacity is a vulnerability assessment and STIG compliance data management tool designed to make security testing more efficient, effective and complete. Security assessments, especially those done for DoD and Federal organizations, produce tremendous amounts of scan and compliance data that security engineers must sort through and deconflict, identify untested requirements, and somehow analyze to communicate risk to their employers. Sagacity, originally written to support a government customer, was designed to fill that need. What if an organization could turn massive amounts of irreconcilable vulnerability scan data into true knowledge and insight about their networks? They would be able to make wise decisions resulting in cost-effective actions to improve their security with the best return on investment. Keen insight. Sound judgment. Wise decisions. Sagacity.
MASTIFF is a static analysis automation framework.
This repository is no longer updated. Please to go https://git.korelogic.com/mastiff.git/ for the latest version! MASTIFF is a static analysis framework that automates the process of extracting key characteristics from a number of different file formats. To ensure the framework remains flexible and extensible, a community-driven set of plug-ins is used to perform file analysis and data extraction. While originally designed to support malware, intrusion, and forensic analysis, the framework is well-suited to support a broader range of analytic needs. In a nutshell, MASTIFF allows analysts to focus on analysis rather than figuring out how to parse files. The official ChangeLog for the project is located at http://mastiff.sourceforge.net/Files/Changelog.txt.
Find web application vulnerabilities the easy way!
The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. Note that this project is no longer used for hosting the ZAP downloads. You should download ZAP via https://github.com/zaproxy/zaproxy/wiki/Downloads Please see the homepage for more information about OWASP ZAP
Anoncrypt-Text Encryption and Decryption Website in Java(Struts2)
Anoncrypt by HTCoders is a web based Text Encryption and Decryption Project using Java Technology following Struts2 Framwork . It Consist of two modules > Password based Encryption (Symmetric Encryption) > Self-Destructible Message Service (Once the message is read , it is destroyed and cant be decrypted again .)
Automate your software testing, the fastest way!
Fastest stands for 'Fast Automated Software test'. * This is a compilation of various open source tools complemented with a set of useful programs that help a Software Test Engineer perform the test automation with ease. * It can be envisioned as a toolkit that every test engineer would need! * Currently implemented in Java * Test Automation is not just about writing test cases in a particular programming language. There are a lot more activities that need to be accomplished in order to make the test automation really become automatic. * Fastest helps automate all the necessary, but difficult test automation tasks like 'Mapping the test case execution with test plan document, updating centralized test management database, reporting, setup of automated nightly regressions in Continuous Integration (CI) environments, Running code / commands on remote hosts, Interacting with Web services, browser based automation using Selenium, SSH access, Sending Email notifications
mod_gnutls apache module
mod_gnutls uses the GnuTLS library to provide SSL 3.0, TLS 1.0, TLS 1.1 and 1.2 encryption for Apache HTTPD. It is similar to mod_ssl in purpose, but does not use OpenSSL.
a powerful multipurpose checksum utility
It's a cross platform utility designed for performing various checksumming activities. It supports verity of standards including ADLER-32, CRC-32, MD2, MD5, MURMUR-32, MURMUR-128, SHA-1, SHA-256, SHA-384, SHA-512 and SIPHASH24. Also generated results can be validated within the application. Results can be saved to a text file format. It can batch process folders as well. This tool requires Java Run-time Environment 7 or higher to use.
Managed .NET wrapper for unmanaged PKCS#11 libraries
This project provides stable releases of Pkcs11Interop project hosted on github. Please visit project website - www.pkcs11interop.net - for more information.
Full Featured Windows Command Line Syslog Logger
NeoLogger is Windows Syslog Client similar to the logger command known from UNIX/LINUX systems used to send SYSLOG messages. It adds some usefull features to filter and replace content, reads from standard input, files or the windows eventlog. It is also able to watch a file or an eventlog for changes and transmits only the new entries. Logit is an additional tool, that logs process or batch output to a log file or windows Eventlog using predefined prefixes and timestamps. (see the screenshots for an Overview) Please donate some (micro-)bitcoins to my address if you saved time and money by using this free project: 1FvGzQvT3tcN47fxdaNjDeSFU6pAUsqMbn
Java Security Manager made easy
The pro-grade library provides implementation of custom Java Security Managers and Security Policies. The main components are the Java Security Policy implementation with deny rules and Policy File generator.
A command line tool to manage bytes in hex dumps or packet captures
Command-line tool to examine or edit bytes in hex, octal, binary, or in packet capture (pcap) dumps. Exd is intended to be used in conjunction with hex dump tools such as xxd, od, hexdump, or hd, and with packet capture dump tools such as tshark and text2pcap. --- metadata tags byte hex octal binary pcap packet packet dump hexdump
PKCS#11 logging proxy module
This project provides stable releases of pkcs11-logger project hosted on github. Please visit project website - https://github.com/Pkcs11Interop/pkcs11-logger - for more information.
A forensic file identification tool using neural networks
Just carved a bunch of bytes and have no idea what they could be? Maybe ANNFiD can help. ANNFiD uses neural network to identify byte patterns. It can be trained and has a GUI to help in the process. The tool is still on a very early stage, but could improve exponentially with the help of the developer community