It provides a common interface to different message digest algorithms, such as MD2, MD4, MD5, SHA, SHA1, SHA256, SHA384 and SHA512. Other algorithms can be added later. Also, it provides a debug capability to export the result at every step.
The PureSecure Plugin Factory Project focus on the production and share of Demarc PureSecure Extensible Service Monitoring (ESM) Plugins .
They can be wrote in any language you want.
Demarc PureSecure is free for non-commercial use.
Wonder who deleted that important file on your Linux box? Did your database files "mysteriously" disappear from that super-secure Linux database server and you don't know how? Now your system logs will tell who, what, when, and how with Auditunlink
Regular Expression, Arbitrary Protocol, Opensource Filtering Firewall (Reapoff) is a regular expression enabled TCP/IP plug proxy.
The proxy operates on data using a pair of simple rule based configuration files defining the testing and actions on th
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
ThorsenCode is a client-server system, that allows you and your buddies to share files in a safe way. It features encrypted filetransfers and encrypted chatrooms.
stands for Active Integrity Software, provide quick alert of elf file modifications.
Based on Gnu/Linux OS, with a daemon to analyse datas give by the kernel module, written in C.
Saint Lawless is a pentetration toolkit. It will be part Cheops and part Nessus with an isometric game-like GUI. Saint Lawless will attempt to gain as much information about a network environment with the least amount of probes. Saint Lawless will also
Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Lcrzoex is a toolbox for network administrators and network hackers. Lcrzoex contains over 400 functionnalities to test an Ethernet/IP network. Each one can be compiled alone and modified to match your needs. It was successfully installed under Linux, Wi
Krome Shield is designed to fool remote fingerprinting tools (using ICMP & TCP), making them think you're running a different OS. It runs under Linux, using the netlink device and ipchains. In the future it will act like an IDS too, detecting attacks a
linsnoop is a unix98-terminal (ptmx) sniffer. Is used to observe a shells input/output. It can be used to observe users, also as keyboard sniffer...
Be careful - the module is able to steal passwords!
ProSum is a terminal based program that protects your files, sys_call_table and IDT like tripwire way (All in user space, without kernel modules) In addition, database with files etc. could be encrypted with Blowfish algorythm and more.
This project is to create a system for secure remote administration of a unix server from a variety of different operating systems (eg unix and windows).
The IP Personality project is a patch to the Linux kernels that adds netfilter features: it enables the emulation of other OSes at the network level, thus fooling remote OS detection tools such as nmap that rely on network fingerprinting.
CuteFTP Password Recovery (cutepr) is a small utility that recovers passwords stored in CuteFTP's database, sm.dat. Sometimes users store the passwords, and then forget them. This utility searches through the database and displays all the site informati
libnwrap - a library of network function wrappers that provides a simple and clear yet powerfull enough API for UNIX network programming. It targets ease of use, protocol independence, reentrancy, thread-safety, as well as built-in cryptograpy
Track all IP/TCP, IP/UDP, NetBeui, IPX/SPX connections and ARP/RARP traffic. Optionally save connections in MySQL database. Implement http server so you can view connections with web browser or GTK client. Can send fake ARP reply and kill TCP connection
This program allow you to extract files from network traffic under HTTP and FTP protocols. It should permit you to see, for instance, using an antivirus on the files, if a machine of your network have downloaded a virus.