| Nazwa oprogramowania |
Strona domowa |
Pobierane |
| libpal |
http://libpal.sourceforge.net/ |
2070x |
|
libpal pozwala na tworzenie własnych pakietów. Jest prostym w użyciu i rozbudowanym narzędziem do budowania sztucznych pakietów TCP/IP.
|
|
|
| THC-UnixHackingTools |
http://www.thc.org |
2069x |
|
Unix rootkit.
|
|
|
| pam_eps |
http://pameps.sourceforge.net/ |
2068x |
|
pam_eps to moduł PAM, który pozwala na uwierzytelnianie użytkowników względem zdalnego serwera z włączonym demonem ssh. Jeśli użytkownik istnieje na lokalnej maszynie, zostaje wpuszczony. Jeśli użytkownik nie istnieje (ale istnieje na zdalnej maszynie i podane hasło jest prawidłowe), nowy użytkownik z tym hasłem i loginem jest tworzony.
|
|
|
| Keychain |
http://www.gentoo.org/[..]ain/index.xml |
2067x |
|
The keychain script makes handling RSA and DSA keys both convenient and secure.
|
|
|
| squidefender |
http://www.jeroen.se/[..]idefender.php |
2066x |
|
Squidefender is a perl script which parses a squid log file in native format for attacks.
|
|
|
| KPGPCrypt |
http://members.tripod.com/[..]ssi/index.htm |
2063x |
|
Key Managment for PGP 5.xx, PGP 6.xx and GPG 1.xx. Supports Add, Delete, Sign, Revoke, Disable Enable keys in graphical environment
|
|
|
| pam_ccreds |
http://www.padl.com/[..]m_ccreds.html |
2054x |
|
The pam_ccreds module provides the means for Linux workstations to locally authenticate using an enterprise identity when the network is unavailable.
|
|
|
| rccrypt |
http://www.ricksoft.co.uk/[..]t/rccrypt.htm |
2054x |
|
RC-Crypt keeps your data safe. It is an easy to use command line program that encrypts your data.
|
|
|
| IPFC |
http://www.conostix.com/ipfc/ |
2052x |
|
IPFC is a software and framework to manage and monitor multiple types of security modules across a global network.
|
|
|
| GnuPG.pm |
http://indev.insu.com/GnuPG/ |
2051x |
|
The GnuPG perl module interfaces with the Gnu Privacy Guard using the coprocess hooks provided by gpg.
|
|
|
| TEA Total |
http://www.linuxhacker.org/tea-total/ |
2051x |
|
TEA Total is a very small 128 bit private key based encryption/decryption system which uses the block variant of TEA (Tiny Encryption Algorithm)
|
|
|
| Shishi |
http://www.gnu.org/[..]tware/shishi/ |
2050x |
|
Shishi, a free implementation of the Kerberos 5 network security system.
|
|
|
| Rkdet |
http://vancouver-webpages.com/rkdet/ |
2048x |
|
Rkdet to mały demon przeznaczony do łapania ludzi instalujących rootkity lub uruchamiających sniffer pakietów.
|
|
|
| THC-Rut |
http://www.thc.org |
2046x |
|
THC-RUT (aRe yoU There, pronouced as root) is your first knife on foreign network. It gathers informations from local and remote networks. It offers a wide range of network discovery tools: arp lookup on an IP range, spoofed DHCP request, RARP, BOOTP, ICMP-ping, ICMP address mask request, OS fingerprintings, high-speed host discovery, ... The tool is capable of discovering a Class B network within 10 minutes.
|
|
|
| THC-WarDrive |
http://www.thc.org |
2043x |
|
The major focus of THC is to investigate and analyze common security solutions and propose concepts for circumventing security mechanisms.
|
|
|