SW Name |
Home page |
Downloaded |
Horatio: Authenticated Network Access |
http://www.cs.utexas.edu/[..]ware/horatio/ |
1390x |
The Horatio system is a firewall authentication tool. The premise: legitimate users want to attach laptops and other mobile hosts to the network, but security demands that illegitimate users be prevented from accessing the internal, secure network and from abusing the general Internet. The approach taken by Horatio is to provide a separate, untrusted network that only connects to the internal network (and thus to the Internet) through a firewall that by default does not pass any traffic. The user must point a Web browser at the Horatio web server, which runs on the firewall machine, and provide a username and password.
|
|
Poppassd-ceti |
http://bolanda.net/[..]poppassd.html |
1389x |
Poppassd-ceti is a Qualcomm password changer daemon with PAM support and several other improvements. This program is intended to be a secure way to change system passwords via the Web.
|
|
SRP |
http://srp.stanford.edu/ |
1389x |
SRP is a secure password-based authentication and key-exchange protocol.
|
|
sbd |
http://www.cycom.se/dl/sbd |
1388x |
Sbd is a Netcat-clone, designed to be portable and offer strong encryption. It runs on Unix-like operating systems and on Microsoft Win32
|
|
ADMsmb |
http://www.void.irq.org/ |
1388x |
ADMsmb is a security scanner for Samba based on the source of smbclient. It will get the netbios name, share list, workgroup, domain, and OS.
|
|
DX-PKI |
http://www.idealx.org/prj/ |
1387x |
IDX-PKI is an Open Source implementation of a Public Key Infrastructure which aims to be IETF compliant for PKIX recommendations. IDX-PKI is routinely used by companies and public agencies.
|
|
KeyNote |
http://www.cis.upenn.edu/[..]/keynote.html |
1386x |
KeyNote is a simple and flexible trust-management system designed to work well for a variety of large- and small- scale Internet-based applications.
|
|
Worm Warner |
http://www.jeroen.se/ |
1386x |
WormWarner is a tool designed to warn hosts that are probably infected by worms.
|
|
Tknetbus |
http://computer.freepage.de/linux-azubi/ |
1385x |
Tcl/TK-Client for the netbusserver, a trojan which allows intruders to control the computer with netbusservers running on
|
|
NuFW |
http://www.nufw.org/[..].php3?lang=en |
1383x |
NuFW is an enterprise grade firewall that performs an authentication of every single connection passing through the IP filter, by transparently requesting user’s credentials before any filtering decision is taken.
|
|
Poppassd-Expect |
http://hinst.net/[..]passd-expect/ |
1383x |
Poppassd-Expect is a clone of the original poppassd program, which is written in C.
|
|
Adeos Filesystem Security Scanner |
http://linux.wku.edu/[..]ftware/adeos/ |
1382x |
Adeos Filesystem Security Scanner is an automated filesystem security scanner. It recursively walks all mounted filesystems on the local system, and attempts to identify common security concerns, such as SUID, and world-writeable files.
|
|
SystemSearcher |
http://www.geektown.de/ |
1377x |
SystemSearcher is a Linux security scanner written in Perl. It scans single hosts or subnets for anonymous FTP servers, TFTP servers, SMTP servers which allow relaying, SSH servers, Telnet servers, NFS servers with exported directories, mail servers, Web servers (HTTP/HTTPS), well- known trojan ports, and exploitable CGIs.
|
|
TEA Total |
http://www.linuxhacker.org/tea-total/ |
1377x |
TEA Total is a very small 128 bit private key based encryption/decryption system which uses the block variant of TEA (Tiny Encryption Algorithm)
|
|
JailTool |
http://www.westfalen.de/~gb/ |
1373x |
JailTool is a script that creates a full chroot environment out of a declarative .jail file. To accomplish this it uses available package registration databases like the dpkg database and Perl CPAN .packlist files to create lists of files to be copied.
|
|