Tool that encrypt a password using answers give by the user from pre-defined or user-defined questions and create a binary file that is used to retrieve the encrypted password (or lost password) by answering questions.
Solution de logon par clé USB
IMUK vous permet de vous logger sur votre poste en plugant une simple clé USB. IMUK vous permettra aussi de stocker, de manière crypté, les données utilisateur afin qu'elle n'encombre plus les postes et serveur.
ISECOM is a non-profit research initiative applying open community cooperation to develop methodologies.
Data exchange is a core part of all cloud systems so it becomes necessarily important to control access to data that are confidential and whose integrity influences the state of the system at any time.It can be proven that the administrator in a IaaS can easily perform some hidden and malicious task on unsuspecting customer machine. This is attributed to the fact that he/she possesses the root privilege to do so and forms an attack. A cold boot attack can easily be lauched amongst other attacks by the privilege user or system administrator.A simple attack scenario could be that a customer pays a virtual machine at Amazon EC2 (Provider) and the systemadmin (Privilidged User) who is, for instance, threatened to be fired, has access to the same virtual machine state, this priviledged user can easily leak customer’s data. There is a need to secure the computation state during communication and storage and we achieve this through the implementation of a trusted platform.
ImpraStorage provided a private imap access to store large files
ImpraStorage provided a private imap access to store large files. Each file stored on the server is split in severals random parts. Each part also contains random noise data (lenght depends on a crypt key) to ensure privacy and exclude easy merge without the corresponding key. An index of files stored is encrypt (with the symmetric-key algorithm Kirmah) and regularly updated. Once decrypt, it permit to perform search on the server and download each part. transfert process is transparent. Just vizualize locally the index of stored files and simply select files to download or upload. ImpraStorage automatically launch the parts to download, then merge parts in the appropriate way to rebuild the original file. Inversely, a file to upload is split (in several parts with addition of noise data), and ImpraStorage randomly upload each parts then update the index.
the problem these days is that we can't find a powerful obfuscator for free for java or .NET, so this project is an initiative to create an obfuscator powerful enougth compared with the obfuscators existing in the market
JPassGen is an usefull strong password generator for secure login protection. (GPL / Java Swing / JNLP)
[not maintained anymore] Jay's Iptables Firewall is a script with support for multiple (external/internal) interfaces, TCP/UDP/ICMP control, masquerading, synflood control, spoofing control, port forwarding, VPNs (vtund), ToS, denying hosts, ZorbIPTraff
The John Darm project aims at developping a software that can tests a brute force attack on weak UNIX passwords. It s a multi-client application that dispatches the calculations between the different clients.
KISS is a kernel-side host-oriented security tool, which may bring you file integrity checking, file and process hiding and actions handling on special internal events (using a tiny scripting language).
A tool to hide a file into a image with no affects the size. It uses a steganography techinique that change the least significant bit in the RGB color systems of non compressed images to store the bits of the file to hide.
Full featured script to visualize statistics from a Kippo SSH honeypot
Kippo-Graph is a full featured script to visualize statistics from a Kippo SSH honeypot. It uses “Libchart” PHP chart drawing library by Jean-Marc Trémeaux, “QGoogleVisualizationAPI” PHP Wrapper for Google’s Visualization API by Thomas Schäfer and geoPlugin geolocation technology (geoplugin.com). Kippo-Graph currently shows 24 charts, including top 10 passwords, top 10 usernames, top 10 username/password combos, success ratio, connections per IP, connections per country, probes per day, probes per week, ssh clients, top 10 overall input, top 10 successful input, top 10 failed input and many more. There are also geolocation data extracted and displayed with Google visualization technology using a Google Map, a Intensity Map, etc. Lastly, input-related data and statistics are also presented giving an overview of the action inside the system and there is live playback ability of captured sessions.
Encryption with symmetric-key algorithm Kirmah - generate keys with exotic chars - redefine key length - key mark to ensure decryption capabilities - mix data - fast with multiprocessing - possible compression - gui on gtk3 - cli tool - python3 DEPENDENCIES : ======== python3, python-gobject, gobject-introspection, pygtk 3 modes are available to encrypt : ======== - compression (full / disabled or only final step) - random (simulate a random order - based on crypted key - to randomize data) - mix (mix data according to a generated map - based on crypted key - with addition of noise) Process is as follow : ======== encrypt : file > [ compress > ] encrypt > [randomiz data > mix data > compress > ] file.kmh decrypt: file.kmh > [ uncompress > unmix data > unrandomiz data] > decrypt > [uncompress > ] file ======== for encrypt/decrypt large binary files, use the fastest alternative : split/merge
This program allow you to extract files from network traffic under HTTP and FTP protocols. It should permit you to see, for instance, using an antivirus on the files, if a machine of your network have downloaded a virus.
The aim of this project is to develop a standalone mobility plateforme, that supply security aspect, network aspect (dialing, QoS, P2P ...), fleet management and which is embedded mobile service such as push (mail, application ...) with an open API.
The Martus (TM) Bulletin System is used by human rights and social justice groups to track violations. This Java program is as easy to use as email. Bulletins can be encrypted or searched, and can be backed up to a remote server. See www.martus.org.
Master Cipher offers a suitable solution when you need a protection me
The Master Cipher software possesses a unique algorithm based on the above symmetric key algorithms. This unique algorithm designed by me is very difficult to exploit using a brute-force attack because of its very complex logic and combination of different algorithms mixed together to develop a strong and an almost unbreakable encryption of a plain text. The software as a whole is of a very small size and has a very easy and basic user interface which makes it very very simple and easy to use. A plain text can be encrypted in many different ways to produce a different encryption each time. As a whole user will be able to carry out the encryption and decryption mechanism without hassle.
Mantén actualizado tu software Antivirus!
Mon projet est de mettre en place une application de vote sécurisé par une authentification biometriques avec le chiffrement de Paillier
All your web in one place
MwwM has no new stuff to offer but the biggest thing. Indeed, MwwM only deals in your web directory. But in addition you can see or judge the reliability of the websites in which You are register.
NAC is a collection of tools for cryptography. The goal is to provide simple-to-use crypto tools (like an OTP, String and number generator, public key algorithm...) you can use under Linux, Windows...
NEDLib is a library that allows detection of advanced network events. It is based on libpcap and designed to be flexible with an intuitive and object oriented API. You can make your program react to any network happenings with only a few lines of code.
A number of tools to enhance management/coding of NFR (http://www.nfr.net) IDA, and various other admin tools that can be used for both NFR and hand coding other appliance scripts.