226 projects tagged "Security"

Download Website Updated 16 Apr 2013 AIDE

Screenshot
Pop 435.47
Vit 4.23

AIDE (Advanced Intrusion Detection Environment) is a file and directory integrity checker. It creates a database from the regular expression rules that it finds from the config file. Once this database is initialized it can be used to verify the integrity of the files. Several message digest algorithms are used. All of the usual file attributes can also be checked for inconsistencies.

No download Website Updated 30 Jan 2012 Bastille Linux / Unix

Screenshot
Pop 395.47
Vit 14.83

Bastille Unix (formerly Bastille Linux) aims to be the most comprehensive, flexible, and educational Security Hardening Program for Red Hat (Fedora Core, Enterprise Linux, and original Red Hat), SuSE, Gentoo, Mandrake, and Debian Linux, as well as HP-UX and Mac OS X. Virtually every task it performs is optional, providing immense flexibility. It educates the installing admin regarding the topic at hand before asking any question. The interactive nature allows the program to be more thorough when securing, while the educational component produces an admin who is less likely to compromise the increased security.

Download No website Updated 11 Aug 2010 Crypto++

Screenshot
Pop 196.16
Vit 3.82

Crypto++ is a C++ cryptographic class library which includes block and stream ciphers, hash functions, MACs, random number generators, public key cryptography (including elliptic curves), compression, and an easy-to-use filter interface.

No download Website Updated 18 Jun 2011 DashO

Screenshot
Pop 154.30
Vit 9.41

DashO is a Java application obfuscator, optimizer, and packager. It performs a dependency analysis on the application, removing unused methods and fields. Classes and members can be renamed using the patented Overload-induction renaming algorithm. Byte code optimization, control flow obfuscation, and string encryption can also be selectively applied. Special features include analytics for Java/Android/RIM/J2ME including exception reporting, Android obfuscation and tamper protection, and JAR watermarking.

Download Website Updated 12 May 2014 DeleGate

Screenshot
Pop 583.61
Vit 153.97

DeleGate is a multi-purpose application level gateway or proxy server that mediates communication of various protocols, applying cache and conversion for mediated data, controlling access from clients, and routing toward servers. It translates protocols between clients and servers, converting between IPv4 and IPv6, applying SSL (TLS) to arbitrary protocols, merging several servers into a single server view with aliasing and filtering. It can be used as a simple origin server for some protocols (HTTP, FTP, and NNTP).

Download Website Updated 28 Mar 2012 Firewall Builder

Screenshot
Pop 637.62
Vit 22.50

Firewall Builder consists of a GUI and set of policy compilers for various firewall platforms. It helps users maintain a database of objects and allows policy editing using simple drag-and-drop operations. The GUI and policy compilers are completely independent, which provides for a consistent abstract model and the same GUI for different firewall platforms. It currently supports iptables, ipfilter, ipfw, OpenBSD pf, Cisco PIX and FWSM, and Cisco routers access lists.

Download Website Updated 30 May 2013 John the Ripper

Screenshot
Pop 1,521.95
Vit 25.56

John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, lots of other hashes and ciphers are added in the community-enhanced version (-jumbo), and some are added in John the Ripper Pro.

No download Website Updated 14 Feb 2014 Tenable Nessus

Screenshot
Pop 1,239.24
Vit 59.73

Tenable Nessus is a world-leader in active vulnerability scanners. It features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery, and vulnerability analysis of your security posture. Nessus scanners may be distributed throughout an entire enterprise, inside DMZs, and across physically separate networks. It is free of charge for personal use in a non-enterprise environment.

Download Website Updated 29 Jan 2011 Nmap Security Scanner

Screenshot
Pop 968.49
Vit 19.29

Nmap ("Network Mapper") is a utility for network exploration, administration, and security auditing. It uses IP packets in novel ways to determine which hosts are available online (host discovery), which TCP/UDP ports are open (port scanning), and what applications and services are listening on each port (version detection). It can also identify remote host OS and device types via TCP/IP fingerprinting. Nmap offers flexible target and port specifications, decoy/stealth scanning for firewall and IDS evasion, and highly optimized timing algorithms for fast scanning.

No download No website Updated 04 Sep 2010 OpenCA

Screenshot
Pop 299.72
Vit 6.34

The OpenCA Project is a collaborative effort to develop a robust, full-featured and Open Source out-of-the-box Certification Authority implementing the most used protocols with full-strength cryptography world-wide. OpenCA is based on many Open-Source Projects. Among the supported software is OpenLDAP, OpenSSL, Apache Project, Apache mod_ssl.

Screenshot

Project Spotlight

liblangtag

An interface library to access tags for identifying languages.

Screenshot

Project Spotlight

Vicomsoft FTP Client

A robust, powerful, and easy-to-use FTP client.