Einfache Projektliste Software-Karte

2198 Projekte im Ergebnis
Letztes Update: 2018-05-07 01:37

PeaZip

PeaZip is a free archiver tool. The application provides an unified, natively portable, cross-platform file manager and archive manager GUI for many Open Source technologies like 7-Zip, FreeArc, PAQ, UPX.

Create: 7Z, ARC, BZip/GZip, PEA, TAR, WIM, XZ, ZPAQ, ZIP files and more

Open and extract 150+ file types: ACE, CAB, DEB, ISO, RAR, ZIPX and more

Features of PeaZip includes extract, create and convert multiple archives at once, create self-extracting archives (sfx), split files, strong encryption with two factor authentication, encrypted password manager, secure deletion, find duplicate files, calculate hashes, export task definition as command line script.

Aktivitätsart Perzentil: 474
Aktivitäten-Rangliste: 20Rang
Register Date: 2010-08-16 15:30
Letztes Update: 2015-06-04 22:40

Darik's Boot and Nuke

Darik's Boot and Nuke (DBAN)は、安全にコンピュータのハードディスクの内容を消去する自己起動フロッピー/CDイメージです。DBANは、一括または緊急のデータ破壊に適切です。

Letztes Update: 2014-06-16 23:19

Clam AntiVirus

Clam AntiVirus is an anti-virus toolkit designed especially for email scanning on mail gateways. It provides a number of utilities, including a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic database updates. The core of the package is an anti-virus engine available as a shared library.

Letztes Update: 2018-06-04 22:38

Parrot Security OS

オウム セキュリティ OS は Debian GNU/[/projects/freshmeat_linux/ Linux] ベースのオペレーティング システムが最高の浸透およびセキュリティ テストの経験を提供するために Frozenbox OS、カリの linux と混合

(Machine Translation)
Letztes Update: 2014-06-14 04:01

WiKID Two-Factor Authentication System

The WiKID Strong Authentication System is a highly scalable, secure, self-hosted two-factor authentication system. It is simple to implement and maintain, allows users to be validated automatically, requires no hardware tokens, has a simple API for application support (via Ruby, PHP, Java, COM, Python, etc.), supports multiple domains, and supports replication for fault tolerance and scalability. It also supports mutual /host and transaction authentication, wireless tokens only domains, locked tokens (to your PC), anti-keystroke logger keypad PIN entry, etc.

Letztes Update: 2013-05-30 23:47

John the Ripper

John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, lots of other hashes and ciphers are added in the community-enhanced version (-jumbo), and some are added in John the Ripper Pro.

Letztes Update: 2013-12-21 01:48

The GNU Privacy Guard

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Letztes Update: 2014-01-31 13:57

Portable OpenSSH

Portable OpenSSH is a Unix/Linux port of OpenBSD's excellent OpenSSH, a full implementation of the SSH1 and SSH2 protocols. It includes sftp client and server support.

Letztes Update: 2014-06-12 11:00

Lynis

Lynis is an security auditing and hardening tool for Unix derivatives like Linux/BSD/Solaris. It performs an in-depth scan on the system to detect software and security issues. Besides information related to security, it will also scan for general system information, installed packages, and possible configuration mistakes. The software is aimed at assisting automated auditing, configuration management, software patch management, vulnerability detection, and malware scanning of Unix-based systems.

Letztes Update: 2017-05-15 03:35

Advanced Onion Router

Advanced Onion Routerは、ORネットワークのためのポータブルなクライアントであり、WIndowsユーザのためのTor+Vidalia+Privoxyのバンドルとしての代換となるものです。改善されたものの一部に、UNICODE のパス、偽のアイデンティティに依存するヘッダーを毎回変更するHTTPヘッダフィルタリングによる幾つかのSocks4/Socks5ポート上でのHTTPおよびHTTPSプロキシプロトコルのサポート、NTLMプロキシのサポート、Torのオプションおよびアクションを作成するためのインターフェース、forbiddenとなっているアドレスのためのローカルなbanリスト、プライベートのアイデンティティの分離、プロキシをサポートしないプログラムから接続を向け直すことができるpoint-and-clickプロセスインターセプター、またローカスシステムおよび.onionアドレスのサポートのための偽の情報といったものがあります。また、 すべてのサーキットのためにAS パスを推定する ことができ、 ASパスのインターセクションを防ぐことができ、異なる国からのノードだけを使って造られるサーキットを制限する ことができて、 サーキット長のより多くを変えることができます。

Letztes Update: 2011-01-29 09:59

Nmap Security Scanner

Nmap ("Network Mapper") is a utility for network exploration, administration, and security auditing. It uses IP packets in novel ways to determine which hosts are available online (host discovery), which TCP/UDP ports are open (port scanning), and what applications and services are listening on each port (version detection). It can also identify remote host OS and device types via TCP/IP fingerprinting. Nmap offers flexible target and port specifications, decoy/stealth scanning for firewall and IDS evasion, and highly optimized timing algorithms for fast scanning.

Letztes Update: 2014-05-15 23:48

SILC

SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing and chat services. It can be used to send any kind of messages, in addition to normal text messages, including multimedia messages like images, video, and audio stream. All messages in the SILC network are encrypted and authenticated, and messages can also be digitally signed. SILC protocol supports AES, SHA-1, SHA-2, PKCS#1, PKCS#3, X.509, OpenPGP, and is being developed in the IETF. The software is delivered as SILC Client for end users, SILC Server for system administrators, and SILC Toolkit for application developers.

(Machine Translation)
Letztes Update: 2011-09-13 21:28

WiKID Strong Authentication System

The WiKID Strong Authentication System is a highly scalable, secure two-factor authentication system. It is simple to implement and maintain, allows users to be validated automatically, requires no hardware tokens, has a simple API for application support (via Ruby, PHP, Java, COM, Python, etc.), supports multiple domains, and supports replication for fault tolerance and scalability. It also supports mutual /host and transaction authentication, wireless tokens only domains, locked tokens (to your PC), anti-keystroke logger keypad PIN entry, etc.

(Machine Translation)
Letztes Update: 2013-10-31 05:17

ettercap

Ettercapは、スイッチドLAN環境のための多目的なスニファ/インターセプター/ロガーです。多くのプロトコル(暗号化されたものも含む)のアクティブもしくはパッシブな分析をサポートし、ネットワークとホスト分析のための多くの機能を含んでいます。

Letztes Update: 2012-05-01 01:35

Rootkit Hunter

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, sniffers, and malware. The application consists of the main shell script, a few text-based databases, and optional Perl scripts. It can recognise and run external applications like 'skdet' and 'unhide'. It should run on almost every Unix clone.