SW Name |
Home page |
Downloaded |
pam_eps |
http://pameps.sourceforge.net/ |
1496x |
pam_eps is a PAM module that allows you to authenticate users against a remote server with a ssh daemon enabled. If the user exists in local machine, he is allowed entry. But if the user doesn't exist (yet exists in the remote machine and the password supplied is correct), a new user with that pass and logname will be created.
|
|
scanlogd |
http://www.openwall.com/scanlogd/ |
1496x |
scanlogd is a system daemon which attempts to log all portscans of a host to the syslog, in a secure fashion.
|
|
blaim |
http://www.im-passe.com/phar/ |
1479x |
Strong crypto (2048bit diffie-hellman & 448bit blowfish..take that subspace) for gaim.
|
|
chkrootkit |
http://www.chkrootkit.org/ |
1478x |
chkrootkit is a tool to locally check for signs of a rootkit. It contains a chkrootkit: shell script that checks system binaries for rootkit modification. The following tests are made: aliens, asp, bindshell, lkm, rexedcs, sniffer, wted, z2, amd, basename, biff, chfn, chsh, cron, date, du, dirname, echo, egrep, env, find, fingerd, gpm, grep, hdparm, su, ifconfig, inetd, inetdconf, identd, killall, login, ls, mail, mingetty, netstat, named, passwd, pidof, pop2, pop3, ps, pstree, rpcinfo, rlogind, rshd, slogin, sendmail, sshd, syslogd, tar, tcpd, top, telnetd, timed, traceroute, and write.
|
|
Makejail |
http://www.floc.net/makejail/ |
1475x |
Makejail employs short configuration files to help administrators create and maintain chroot jails.
|
|
trapdoor2 |
http://oss.linbit.com/trapdoor2/ |
1467x |
Trapdoor2 (td2) allows remote users to execute local commands by sending 'magic cookies'. this can e.g. be used to alter local firewalling rules so people can connect to local services after sending the magick cookie.
|
|
ip-masq-log |
http://www.cli.di.unipi.it/[..]zunino/linux/ |
1464x |
This patch can be used on a masquerading firewall (NAT) to keep a log of all the outgoing masqueraded TCP connections.
|
|
TkPGP |
http://packages.debian.org/[..]le/misc/tkpgp |
1462x |
TkPGP intends to completely eliminate need to access command- line interface of PGP for UNIX. Currently most of casual activity such as signing, encrypting and decrypting is done in GUI. Key management remains a domain of command line for the time being.
|
|
Shishi |
http://www.gnu.org/[..]tware/shishi/ |
1456x |
Shishi, a free implementation of the Kerberos 5 network security system.
|
|
GnuPG.pm |
http://indev.insu.com/GnuPG/ |
1450x |
The GnuPG perl module interfaces with the Gnu Privacy Guard using the coprocess hooks provided by gpg.
|
|
Medusa DS9 |
http://medusa.terminus.sk/ |
1445x |
Medusa DS9 is used to increase Linux's security. It consists of two major parts, Linux kernel changes and the user-space daemon.
|
|
pyCA |
http://www.pyca.de/ |
1440x |
pyCA tries to make it easier for people to set up and run a organizational certificate authority which fulfills the need for a fairly secure certification processing.
|
|
rccrypt |
http://www.ricksoft.co.uk/[..]t/rccrypt.htm |
1435x |
RC-Crypt keeps your data safe. It is an easy to use command line program that encrypts your data.
|
|
DNS Flood Detector |
http://www.adotout.com/ |
1435x |
DNS Flood Detector was developed to detect abusive usage levels on high traffic nameservers and to enable quick response in halting (among other things) the use of one's nameserver to facilitate spam.
|
|
KPGPCrypt |
http://members.tripod.com/[..]ssi/index.htm |
1423x |
Key Managment for PGP 5.xx, PGP 6.xx and GPG 1.xx. Supports Add, Delete, Sign, Revoke, Disable Enable keys in graphical environment
|
|