SW Name |
Home page |
Downloaded |
DX-PKI |
http://www.idealx.org/prj/ |
1387x |
IDX-PKI is an Open Source implementation of a Public Key Infrastructure which aims to be IETF compliant for PKIX recommendations. IDX-PKI is routinely used by companies and public agencies.
|
|
Worm Warner |
http://www.jeroen.se/ |
1386x |
WormWarner is a tool designed to warn hosts that are probably infected by worms.
|
|
KeyNote |
http://www.cis.upenn.edu/[..]/keynote.html |
1386x |
KeyNote is a simple and flexible trust-management system designed to work well for a variety of large- and small- scale Internet-based applications.
|
|
Tknetbus |
http://computer.freepage.de/linux-azubi/ |
1385x |
Tcl/TK-Client for the netbusserver, a trojan which allows intruders to control the computer with netbusservers running on
|
|
NuFW |
http://www.nufw.org/[..].php3?lang=en |
1383x |
NuFW is an enterprise grade firewall that performs an authentication of every single connection passing through the IP filter, by transparently requesting user’s credentials before any filtering decision is taken.
|
|
Poppassd-Expect |
http://hinst.net/[..]passd-expect/ |
1383x |
Poppassd-Expect is a clone of the original poppassd program, which is written in C.
|
|
Adeos Filesystem Security Scanner |
http://linux.wku.edu/[..]ftware/adeos/ |
1382x |
Adeos Filesystem Security Scanner is an automated filesystem security scanner. It recursively walks all mounted filesystems on the local system, and attempts to identify common security concerns, such as SUID, and world-writeable files.
|
|
SystemSearcher |
http://www.geektown.de/ |
1377x |
SystemSearcher is a Linux security scanner written in Perl. It scans single hosts or subnets for anonymous FTP servers, TFTP servers, SMTP servers which allow relaying, SSH servers, Telnet servers, NFS servers with exported directories, mail servers, Web servers (HTTP/HTTPS), well- known trojan ports, and exploitable CGIs.
|
|
TEA Total |
http://www.linuxhacker.org/tea-total/ |
1377x |
TEA Total is a very small 128 bit private key based encryption/decryption system which uses the block variant of TEA (Tiny Encryption Algorithm)
|
|
Keychain |
http://www.gentoo.org/[..]ain/index.xml |
1373x |
The keychain script makes handling RSA and DSA keys both convenient and secure.
|
|
JailTool |
http://www.westfalen.de/~gb/ |
1373x |
JailTool is a script that creates a full chroot environment out of a declarative .jail file. To accomplish this it uses available package registration databases like the dpkg database and Perl CPAN .packlist files to create lists of files to be copied.
|
|
pam_ccreds |
http://www.padl.com/[..]m_ccreds.html |
1369x |
The pam_ccreds module provides the means for Linux workstations to locally authenticate using an enterprise identity when the network is unavailable.
|
|
dlogin |
http://davmac.org/dlogin/ |
1368x |
dlogin is a replacement login which allows automatically adding users who login via a virtual terminal (local terminal) to a group or list of groups temporarily. This can be used to allow such a user to shutdown the system, use the audio device, etc., even if they are not root.
|
|
cryptcat |
http://sourceforge.net/[..]cts/cryptcat/ |
0x |
Cryptcat is a lightweight version of netcat with integrated transport encryption capabilities.
|
|
RSBAC - Rule Set Based Access Control. |
http://www.rsbac.org/ |
0x |
RSBAC is a Linux kernel patch which provides several powerfull security modules. The functionality of these modules goes way beyond the standard UNIX access control features. So it is not difficult to imagine that RSBAC is going to play an important role in a security related project like the Adamantix project. The features which are important to the Adamantix project are: RSBAC is a real free software project and like many free software projects mostly developed by a single developer, Amon Ott, and many users who file bug reports and new feature requests. Amon runs the project on his own and can thus keep the code consistent and clean, which is exactly what you want for a security related project. The project is not subject to government contract terms or corporate sponsoring terms and therefore decisions can be made purely on technical and practical grounds and do not suffer from politics or conflicts between groups with different interests. The design of the system and the code reflects this.
|
|