*PassGuard suite provides a series of application used to manage your numerous passwords in an encrypted file. Additionally, a C++ framework is provided to create password management applications. Plugins system managed different encryption methods.
Deobscufates .NET assemblies, primarily by rearranging IL code (basic block reordering) and removing junk. Designed to be modular, it is built from reusable pieces.
0 byte, is a SLAX modification to security. Download order: Boot directory: -slax.cfg -vmlinuz -initrd.gz -dban.bzi Slax directory: +base directory: -001-core -002-xorg -003-desktop -004-kdeapps -005-devel -008-0byte +modules directory -driverrak -segurt
Java based Portable hashing application capable of multiple individual file signatures or proprietary group signatures (1 signature for a folder and all its contents). GUI and command line in the same executable. -sha1 -sha256 -sha51 -md5 -crc32
This ain't your daddy's crypto! We provide a set of C libs and utilities to perform cypherpunk style crypto functions, using your existing OpenPGP keys. Ring signatures; credentials; mental poker; timelines; zero knowledge proofs. Cool stuff!
360-FAAR Analyze FW1 Cisco Netscreen Policy Offline Using Config/Logs
360-FAAR (Firewall Analysis Audit and Repair) is an offline, command line, firewall policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in Checkpoint dbedit, Cisco ASA or ScreenOS commands, and its one file! Read Policy and Logs for: Checkpoint FW1 (in odumper.csv / logexport format), Netscreen ScreenOS (in get config / syslog format), Cisco ASA (show run / syslog format), 360-FAAR compares firewall policies and uses CIDR and text filters to split rulebases / policies into target sections and identify connectivity for further analysis. 360-FAAR supports, policy to log association, object translation, rulebase reordering and simplification, rule moves and duplicate matching automatically. Allowing you to move rules to where you need them. Build new rulebases from scratch with a single 'any' rule and log files, with the 'res' and 'name' options. Switch into DROPS mode to analyse drop log entries.
4TIAM is a software which interact securely with a nix computer through a simple mailbox.
Simple and easy to use password generator.
7PasswordManager is a simple and easy to use random password generator software program. It will create different combinations of letters and numbers.
A collection of python scripts which maintain a small linux distribution for a web-managed VPN endpoint providing distributed authentication, roaming profiles, and PKI services. All management is done via encrypted http. Uses LDAP, Kerberos, Apache, Pyth
As we know, in hign school, you need to login into a client to get to the internet, but the client are always for Windows XP, the Linux and Mac are always ignored by them. Here we will take you a open source client!
Open-source tool for Linux that can be used as part of live information gathering during an incident response to allow for after the fact in depth analysis of the running system.
A text editor which saves data encrypted with strong cryptography (AES, Blowfish..)
The file recovery process is not an easy task to run on Linux and Unix based OSes and there`s almost no good user interfaces for end users, so that`s why, El Recuperador, is intended to make a generic Web-based GUI framework based on forensics informatic
Floppy Firewall Linux is a mini-linux distro for firewall use. It derives from Coyote Linux Firewall.
This Plugin provides very simple and powerful captcha for your blog
This Plugin provides very simple and powerful captcha for your blog with wide variety of logical methods and models. By displaying different logical captcha with random manner may provide high level of security. Users can select wide variety of methods to display the captcha 1. Sorting in increasing or decreasing order 2. Entering biggest or smallest number 3. Selecting Am or Am Not Spammer using combo box 4. Entering the alphabets 5. Addition or Subtraction 6. Selecting Am Not Spammer using check box
A set of Unixish tools allowing encrypted and compressed backups be done on exchangible media.
Grained Login is a fine-grained login system for Qt applications. It uses SHA1 hashed passwords to retrieve user rights from a SQLite database. An administration dialog handles the maintenance of the users, the roles, the rights and the password history.
Inguma is a free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembl
A simple SSO (Single SignOn) written in JEE.
A security framework for providing AAA functionality for Avalon based applications. The pluggable architecture for underlying datastores and Authentication, Authorization and Auditing Managers provides a flexible, extensible framework.
A C++/Qt program for use in encrypting and decrypting simple substitution cyphers. These cyphers are often found in newspapers and various puzzle books.
Automated Computer Auditing Daemon - Keep a track of what's going on with your systems: suid, sgid, world writable, hidden and unowned files monitoring as well as important file's md5sums management audits sent to your mailbox on a regular basis.
Pure managed C# implementation of well-known cryptographic hash functions such as SHA-family (SHA0, SHA1, SHA2), MD-family (MD2, MD4, MD5), RIPEMD, Tiger, Haval, Snefru and others.
ADAM is the Active Defense Algorithm and Model. It is a formally defined process of determining appropriate active response actions in the event of an attack. This implementation shows that active defense can be a legitimate and responsible security tool