| Nazwa oprogramowania |
Strona domowa |
Pobierane |
| Keychain |
http://www.gentoo.org/[..]ain/index.xml |
2015x |
|
The keychain script makes handling RSA and DSA keys both convenient and secure.
|
|
|
| THC-Rut |
http://www.thc.org |
2015x |
|
THC-RUT (aRe yoU There, pronouced as root) is your first knife on foreign network. It gathers informations from local and remote networks. It offers a wide range of network discovery tools: arp lookup on an IP range, spoofed DHCP request, RARP, BOOTP, ICMP-ping, ICMP address mask request, OS fingerprintings, high-speed host discovery, ... The tool is capable of discovering a Class B network within 10 minutes.
|
|
|
| THC-WarDrive |
http://www.thc.org |
2014x |
|
The major focus of THC is to investigate and analyze common security solutions and propose concepts for circumventing security mechanisms.
|
|
|
| TEA Total |
http://www.linuxhacker.org/tea-total/ |
2013x |
|
TEA Total is a very small 128 bit private key based encryption/decryption system which uses the block variant of TEA (Tiny Encryption Algorithm)
|
|
|
| fcatalog |
http://fcatalog.lupine.org/ |
2013x |
|
fcatalog is a program for identifying the origins of files. Though its operation is similar to the operation of file-checksum-checking security utilities (like tripwire), its purpose and methodology is different.
|
|
|
| PGP |
http://www.pgpi.org/ |
2013x |
|
Tool for secure datas - mainly e-mail communication. Basic version free.
|
|
|
| Strobe |
http://fr3dy.meanmachine.ch/strobe.html |
2010x |
|
Strobe is a fast TCP Port Scanner.
|
|
|
| authd_ |
http://69.56.132.179/~ury/ |
2004x |
|
authd_ to demon uwierzytelniania dla Linuksa. Działa bez korzystania z bitu SUID na plikach wykonywalnych oraz obsługuje interfejsy PAM i NSS oraz /etc/passwd, /etc/shadow i MySQL do przechowywania informacji o użytkownikach.
|
|
|
| CODEX |
http://www.umiacs.umd.edu/[..]mmarsh/CODEX/ |
2004x |
|
CODEX is designed for applications with a moderate number of clients (tens or hundreds) requesting keys that change often but not continuously (on the scale of minutes to hours).
|
|
|
| THC-Probe |
http://www.thc.org |
2003x |
|
The ultimate host scanner compilation for Linux, featuring nmap, snmpscan, netbios auditing tool and super-cool vh shell script.
|
|
|
| Tunnel Vision |
http://open.nit.ca/[..]=TunnelVision |
2002x |
|
TunnelVision creates an encrypted VirtualPrivateNetwork, or VPN, between two Tunnel Vision-capable sites on the Internet.
|
|
|
| THC-Vmap |
http://www.thc.org |
2001x |
|
Vmap stands for version mapper. It allows you to find out the version of a daemon by fingerprinting the features and replys of bogus commands. It's a great addition to the other *map tools.
|
|
|
| Horatio: Authenticated Network Access |
http://www.cs.utexas.edu/[..]ware/horatio/ |
2001x |
|
Horatio system to to narzędzie do autentykacji na firewallu. Uprawnieni użytkownicy chcą podłączać laptopy i inne przenośne hosty do sieci, ale wymagania związane z bezpieczeństwem zabraniają nieupoważnionym dostępu do wewnętrznej bezpiecznej sieci i nadużywania Internetu. Horatio oferuje oddzielną, niezaufaną sieć, która jest połączona z siecią wewnętrzną (a przez nią Internetem) poprzez firewall, który domyślnie nie przepuszcza żadnego ruchu. Użytkownik musi połączyć się za pomocą przeglądarki z serwerem WWW Horatio, który działa na maszynie z firewallem i wpisać swóją nazwę użytkownika oraz hasło.
|
|
|
| NuFW |
http://www.nufw.org/[..].php3?lang=en |
2001x |
|
NuFW is an enterprise grade firewall that performs an authentication of every single connection passing through the IP filter, by transparently requesting user’s credentials before any filtering decision is taken.
|
|
|
| THC-Grenzgaenger |
http://www.thc.org |
1998x |
|
|
|
|