![]() |
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() ![]() ![]() |
|
FIRST <<< | PREV < | Showing items 346 to 360 | > NEXT | >>> LAST |
SW Name | Home page | Downloaded |
---|---|---|
Stunnel | http://www.stunnel.org/ | 1972x |
Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code. | ||
|
Network Security Analysis Tool | http://nsat.sourceforge.net/ | 1971x |
nsat is a fast, stable bulk security scanner designed to audit remote network services and check for versions, security problems, gather information about the servers and the machine, and much more. | ||
|
HTun | http://htun.runslinux.net/ | 1971x |
HTun is a tool to allow you to create a fully bidirectional IP VPN over an HTTP proxy or just over port 80, allowing you to bypass restrictive firewalls and use any service you desire. HTun creates an point-to-point virtual IP network over HTTP by encapsulating IP traffic into valid HTTP requests. The HTun server runs on a host with an unrestricted Internet connection. It listens on a common webserver port (80 or 443) and accepts HTun client connections. The HTun client daemon runs from within a restrictive network environment, communicating with the HTun server over an HTTP proxy. | ||
|
aggregate | http://www.vergenet.net/[..]ux/aggregate/ | 1969x |
Aggregate is a tool for aggregating CIDR networks. Input is read from stdin and output is written to stdout. | ||
|
Fire-Waller | http://www.saunalahti.fi/[..]/fire-waller/ | 1967x |
Fire-Waller reads your syslog against packet filter rows and creates HTML output of the found rows. | ||
|
cryptoswap | http://www.flyn.org/[..]ap/index.html | 1967x |
The cryptoswap package supports building an encrypted swap partition when a system boots. This may be necessary on systems that use encrypted filesystems because plaintext secrets may be written to disk when memory is swapped to disk. | ||
|
Impost | http://impost.sourceforge.net/ | 1966x |
Impost is a network security auditing tool designed to analyze the forensics behind compromised and/or vulnerable daemons. There are two different kinds of operating modes; it can either act as a honey pot and take orders from a Perl script controlling how it responds and communicates with connecting clients, or it can operate as a packet sniffer and monitor incoming data to specified destination port. | ||
|
GNU Privacy Assistant | http://www.gnupg.org/[..]software/gpa/ | 1964x |
The GNU Privacy Assistant (GPA) is a graphical user interface for the GnuPG (GNU Privacy Guard). | ||
|
Secure back door | http://sbd.sourceforge.net/ | 1964x |
Secure Back Door (SBD) is a tool that provides ultra-secure and minimal access to a computer, which allows you to run a single command based on a one time key. | ||
|
Yin Yang | http://yinyang.sourceforge.net/ | 1962x |
Yin Yang is a real-time Linux file scanner that is activated whenever a file is accessed. When a file opening system call is detected, it will send the full pathname of the file to a network daemon. The network daemon will then pass the pathname of the file to a file scanner, such as an anti-virus scanner, and return the status. | ||
|
Ciphire Mail | http://www.ciphire.com/ | 1958x |
Ciphire Mail is an email encryption tool. It works in conjunction with your existing email client. | ||
|
Firepass | http://gray-world.net/[..]irepass.shtml | 1956x |
Firepass is a tunneling tool allowing users bypass firewall restrictions and encapsulate data flows inside legal ones that use HTTP POST requests. TCP or UDP based protocols may be tunneled with Firepass. | ||
|
KWoodhammer | http://kwoodhammer.sourceforge.net/ | 1956x |
KWoodhammer is the all-in-one solution for traditional encryption methods as you know from Enigma, the Pope or the Russian Secret Service (KGB). | ||
|
Return-RST | http://www.bellamy.co.nz/[..]section5.html | 1954x |
Return-RST is a firewalling tool for Linux 2.2.xx systems using IPCHAINS. It uses the netlink device to capture packets and sends TCP RST packets in response to TCP connection requests. | ||
|
yersinia | http://yersinia.sourceforge.net/ | 1953x |
Yersinia is a network tool designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. | ||
|
FIRST <<< | PREV < | Showing items 346 to 360 | > NEXT | >>> LAST |
1. |
Pacman linux Download: 5409x |
2. |
FreeBSD Download: 9600x |
3. |
PCLinuxOS-2010 Download: 9092x |
4. |
alcolix Download: 11558x |
5. |
Onebase Linux Download: 10265x |
6. |
Novell Linux Desktop Download: 0x |
7. |
KateOS Download: 6767x |
1. |
xinetd Download: 2915x |
2. |
RDGS Download: 937x |
3. |
spkg Download: 5736x |
4. |
LinPacker Download: 10896x |
5. |
VFU File Manager Download: 3620x |
6. |
LeftHand Mała Księgowość Download: 7787x |
7. |
MISU pyFotoResize Download: 3339x |
8. |
Lefthand CRM Download: 4065x |
9. |
MetadataExtractor Download: 0x |
10. |
RCP100 Download: 3632x |
11. |
Predaj softveru Download: 0x |
12. |
MSH Free Autoresponder Download: 0x |