| Nazwa oprogramowania |
Strona domowa |
Pobierane |
| Riley |
http://www3.telus.net/[..]er/riley.html |
1989x |
|
Riley is a file integrity checker written in Perl,somewhat similar to Tripwire.
|
|
|
| THC-UnixHackingTools |
http://www.thc.org |
1986x |
|
Unix rootkit.
|
|
|
| yyyRSA |
http://www.erikyyy.de/yyyRSA/ |
1985x |
|
A simple program to encrypt and decipher messages with
the RSA asymetrical encryption algorithm.
|
|
|
| Strobe |
http://fr3dy.meanmachine.ch/strobe.html |
1983x |
|
Strobe is a fast TCP Port Scanner.
|
|
|
| GnuPG.pm |
http://indev.insu.com/GnuPG/ |
1983x |
|
The GnuPG perl module interfaces with the Gnu Privacy Guard using the coprocess hooks provided by gpg.
|
|
|
| LinVPN |
http://mrtg.planetmirror.com/pub/linvpn/ |
1981x |
|
LinVPN allows you to create a VPN (Virtual Private Network) from linux to linux. Normally both are gateways of a LAN, then the LANs behind them may access each other over an encrypted tunnel created by the software.
|
|
|
| Makejail |
http://www.floc.net/makejail/ |
1981x |
|
Makejail oferuje krótkie pliki konfiguracyjne pomagające administratorom tworzyć i zarządzać środowiskami chroot jail.
|
|
|
| THC-SecureDelete |
http://www.thc.org/ |
1979x |
|
Tool for secure deleting files.
|
|
|
| triggers |
http://www.igmus.org/code/ |
1976x |
|
A trigger is a lightweight, asynchronous notification mechanism to set off events in and across systems.
|
|
|
| KeyNote |
http://www.cis.upenn.edu/[..]/keynote.html |
1976x |
|
KeyNote is a simple and flexible trust-management system designed to work well for a variety of large- and small- scale Internet-based applications.
|
|
|
| fcatalog |
http://fcatalog.lupine.org/ |
1976x |
|
fcatalog is a program for identifying the origins of files. Though its operation is similar to the operation of file-checksum-checking security utilities (like tripwire), its purpose and methodology is different.
|
|
|
| THC-Rut |
http://www.thc.org |
1975x |
|
THC-RUT (aRe yoU There, pronouced as root) is your first knife on foreign network. It gathers informations from local and remote networks. It offers a wide range of network discovery tools: arp lookup on an IP range, spoofed DHCP request, RARP, BOOTP, ICMP-ping, ICMP address mask request, OS fingerprintings, high-speed host discovery, ... The tool is capable of discovering a Class B network within 10 minutes.
|
|
|
| keymgr |
http://www.rcpt.to/keymgr/ |
1975x |
|
Keymgr is a cryptographic policy engine.
|
|
|
| THC-WarDrive |
http://www.thc.org |
1975x |
|
The major focus of THC is to investigate and analyze common security solutions and propose concepts for circumventing security mechanisms.
|
|
|
| KPGPCrypt |
http://members.tripod.com/[..]ssi/index.htm |
1973x |
|
Key Managment for PGP 5.xx, PGP 6.xx and GPG 1.xx. Supports Add, Delete, Sign, Revoke, Disable Enable keys in graphical environment
|
|
|