Corbicula anti virus provides a GNOME HIG compliant front end for ClamAV
A shell that looks and acts like a real unix-style shell, but doesn't modify the system it runs on. Ideal for sandbox SSH accounts.
CTS is a standalone web service for converting security tokens in different formats. It uses a WS-Trust interface and supports all security token formats profiled by OASIS, including UsernameToken, Kerberos ticket, X509 Certificate and SAML assertion.
Cross Site Scripting Anonymous Browser (XAB) leverages web sites and client browsers to build a network of drones. It is not to replace the current anonymous browsing applications, but provides an alternative that does not require willing participants.
Crybt is a Data-Encryption-Tool. You can use it easily for Dropbox.
Crybt is based on the Rijandael algorithm (AES). You can use it to encrypt your sensitive files direct into your Dropbox. But you can also use it for normal file-encryption. Crybt works with a new algorithm built by me ,that allowes you to save your password almost uncrackable.
CrypTunnel is a generic cryptographed tunnel for tcp connections. its goal is to allow connections through "mean" firewalls and proxies with the tunnel and protect the content of the packages with cryptography
Cryptic is a cryptographic applications suite for encryption/decryption of data, calculating cryptographic hashes or message digests and securing user passwords using a master password in a password safe.
An open source, easy to use encryption program, with features to help keep your encrypted files secure.
Crypto je aplikacija za mobilne telefone, koja sluzi za kriptovanje SMS poruka polialfabetskom sifrom.
Makes it easier to build a Linux system where the whole hard drive is encrypted (except for the MBR), and where the system must be booted from a USB memory stick which holds slightly customized boot code and the passphrase-protected keys.
the library provides elliptic-curves cryptographic functionality (as described in russian standards R-34.*) and also huge integers arithmetics and finite fields arithmetics functions NOTE ! you have an option to choose your own RNG
The purpose of this project is to create a library of cryptographic functions for .NET, in fully managed C#. This will extend the existing .NET framework crypto functionality.
CryptoGnome is an attempt to reinvent the wheel without reinventing the wheel. The final goal is an open source VCS similiar to ClearCase. There will be a major milestone at the CVS/PRCS level of functionality.
This project is a collection of labs from the book by N. Smart, "Cryptography". Programming language: C/C++. OS: QNX.
This tool provides an J2ME Application for your mobile phone for sending SMS ciphered (DES, 3DES, IDEA, RC2, Blowfish, AES, Rijandel).
Cryptographic Disk Driver for Linux
A very simple encryption tool. Includes: 1. Ability to encrypt files and text using the Blowfish algorithm 2. Encode files and text using Base 64 algorithm, 3. ROT13 4. Calculation of MD5 digests
This is a program to actually log a user off of Win32 desktop at a specified time.
Cyana is a security framework for analyzing security systems and developing methods of exploitation.
CyberDemon is highly experimental prototype of the antivirus engine and is based on a new model of artificial neuron (cyberneuron).
The program uses a number of processes to brute-force crack MD5 hashes. MD5 brute-force cracking involves hashing all possible strings and each time compare the obtained hash to the one we are trying to crack
DDoS Wifi Attack
DDoS Wifi Attack
Perform anonymous and non-anonymous pentesting.
DENRIT allows remote administration of anonymous networks (TOR, I2P and FreeNet). Also, contains a pentesting module to execute commands using a selected anonymous network, pentesting with TOR or TCP Follows a client/server model with well-defined communication interfaces. SSH is used to allow remote clients to access the machine and manage any anonymous network that is installed there, plus allows penetration testing anonymously (or non-anonymously) using tools such as Metasploit Framework, nmap, nikto, among others. The list of supported applications will grow as the project progresses. Until now, this project is under development and is very unstable (and some features aren't included). But I've been developing constantly and I think that soon this software will become stable and very useful to pentesters, hackers and researchers (I hope so!) Well, you can see the wiki page and the presentation exposed in the download section if you want more information about this project.
This is a Java project that aims to provide an implementaion of the Oasis Kerberos Token Profile 1.1, by providing both client and server side java classes.