The goal of the AppCrack project is to allow users to decompile/disassemble .exe programs (allowing users to see the source code) using a simple program instead of long, tedious, unreliable solutions like debuggers.
Authen::Simple::WebForm - Perl library for simple authentication against existing web based forms using Authen::Simple framework.
CryptoPy is a pure python implmentation of cryptographic algorithms and applications. The algorithms are developed for readability more than speed. The collection now includes IEEE 802.11i specific algorithms that generated the test vectors for 802.11i.
HFNetNag is a program that simplifies tracking the Hot Fixes that are required on Windows 2000 and NT systems. Its main function is to periodically run HFNETCHK.EXE and submit a nicely formatted report of required updates to an administrator.
An English-language HoChiMinh-City Linux User Group focused on researching, developing and promoting Free, Linux & Open-source information systems for improving collaboration between SaiGon and the rest of the world.
This perl script merges two keepassx databases into one.
Nessconnect is a GUI, CLI and API client for Nessus and Nessus compatible servers. With an improved user interface, it provides local session management, scan templates, report generation through XSLT, charts and graphs, and vulnerability trending.
In a windows 2003 server domain environment, how to restrict clients
An nmap output parser for scan data using PERL. Nmap Parser is a PERL module that makes developing security and audit tools using nmap and PERL easier. nmap is one of the best security scanners.
Powerful 512bit pseudo random encryption, optimized for the x86-64 architecture. Coded in x86-64 assembly language, this has the potential to be one of the most powerful and fastest file encryption engines to date.
A Java based HTTP/HTTPS proxy for assessing web application vulnerability. It supports editing/viewing HTTP messages on-the-fly. Other featuers include spiders, client certificate, proxy-chaining, intelligent scanning for XSS and SQL injections etc.
A collection of Perl libraries and tools to interface with the Palm Strip application for storing encrypted passwords.
Project Naranja will uses Padlock Security of VIA EPIA mini-ITX motherboards in order to provide a toolkit to set up and use encrypted filesystems with Linux. NOTE: Files are now hosted at Google Code: http://code.google.com/p/naranja/
Retyping Dante is a media art-piece on cultural products produced through, and social developments surrounding web 2.0. The project consist of software which enables you to securely join the devoted community committed to retyping 'La Divina Commedia'.
An information engineering multi-tool, useful for debugging, security work and other tinkering endeavors. With an open plugin architecture, it can be easily extended to provide hours of fun.
SisyphusScan is a wrapper to malware scanners that can be used for cyclic scanning of files (i.e. accross several executions). The scanning process is optimized with a cache. Currently supports the clamd daemon from the ClamAV tools suite.
A full-featured, Java-based back-office suite specifically designed for use in global financial institutions to facilitate straight-through-processing and other much-needed operational efficiencies. Built using best-of-breed, open-source technologies.
TXTCOD encodes and decodes any type of file with a modular algorithm named SAC.
Perl interface to functions that assist in working with Microsoft's CryptoAPI
KeePass Command Line Interface
KeePass Command Line Interface (CLI) / interactive shell. Use this program to access and manage your KeePass 1.x or 2.x databases from a Unix-like command line.
This is C++ implementation of russian GOST 28147-89 encryption and R34.11-94 hash algorithms. The main objective of project is not speed, but portability. Test suite included.
sec-unx: It is an approach by which the Unix/Linux Security is made uniform across various distribution.
SPprotect (Scar Podarok protection) is a CD protection library, based on CD filesystem protection via original mechanism of our mind 8)