SlunkCrypt is moving to '''[https://lord_mulder.gitlab.io/slunkcrypt/]''' due to ongoing technical problems on OSDN.net!
Register Date: 2022-02-02 04:39
|
Verwandte ProjekteAdvanced Onion Router, プロジェクト・ナニ屋, lpsolve, mcrypt, EasyPG |
Clam AntiVirus is an anti-virus toolkit designed especially for email scanning on mail gateways. It provides a number of utilities, including a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic database updates. The core of the package is an anti-virus engine available as a shared library.
Verwandte ProjekteSeasar, Dumpper v.60.3, OpenTween, PukiWiki, MeCab |
The WiKID Strong Authentication System is a highly scalable, secure, self-hosted two-factor authentication system. It is simple to implement and maintain, allows users to be validated automatically, requires no hardware tokens, has a simple API for application support (via Ruby, PHP, Java, COM, Python, etc.), supports multiple domains, and supports replication for fault tolerance and scalability. It also supports mutual /host and transaction authentication, wireless tokens only domains, locked tokens (to your PC), anti-keystroke logger keypad PIN entry, etc.
Verwandte ProjektePeaZip, Darik's Boot and Nuke, SmillaEnlarger, iReport-Designer for JasperReports, DeSmuME |
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, lots of other hashes and ciphers are added in the community-enhanced version (-jumbo), and some are added in John the Ripper Pro.
Verwandte ProjekteMedia Player Classic - Home Cinema, MPC-BE, PeaZip, Win32 Disk Imager, Dumpper v.60.3 |
Lynis is an security auditing and hardening tool for Unix derivatives like Linux/BSD/Solaris. It performs an in-depth scan on the system to detect software and security issues. Besides information related to security, it will also scan for general system information, installed packages, and possible configuration mistakes. The software is aimed at assisting automated auditing, configuration management, software patch management, vulnerability detection, and malware scanning of Unix-based systems.
Verwandte ProjekteCaitSith, MeCab, SELinux for Japanese Users, AKARI, Media Player Classic - Home Cinema |
Portable OpenSSH is a Unix/Linux port of OpenBSD's excellent OpenSSH, a full implementation of the SSH1 and SSH2 protocols. It includes sftp client and server support.
GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.
Verwandte ProjekteDeSmuME, SmillaEnlarger, SlunkCrypt, Darik's Boot and Nuke, x64dbg |
The WiKID Strong Authentication System is a highly scalable, secure two-factor authentication system. It is simple to implement and maintain, allows users to be validated automatically, requires no hardware tokens, has a simple API for application support (via Ruby, PHP, Java, COM, Python, etc.), supports multiple domains, and supports replication for fault tolerance and scalability. It also supports mutual /host and transaction authentication, wireless tokens only domains, locked tokens (to your PC), anti-keystroke logger keypad PIN entry, etc.
Verwandte ProjektePeaZip, AKARI, SlunkCrypt, RMAC, MPC-BE |
Nmap ("Network Mapper") is a utility for network exploration, administration, and security auditing. It uses IP packets in novel ways to determine which hosts are available online (host discovery), which TCP/UDP ports are open (port scanning), and what applications and services are listening on each port (version detection). It can also identify remote host OS and device types via TCP/IP fingerprinting. Nmap offers flexible target and port specifications, decoy/stealth scanning for firewall and IDS evasion, and highly optimized timing algorithms for fast scanning.
Verwandte ProjekteMeCab, Samba Japanese Translation Project[relocated], x64dbg, Dumpper v.60.3, Win32 Disk Imager |
SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing and chat services. It can be used to send any kind of messages, in addition to normal text messages, including multimedia messages like images, video, and audio stream. All messages in the SILC network are encrypted and authenticated, and messages can also be digitally signed. SILC protocol supports AES, SHA-1, SHA-2, PKCS#1, PKCS#3, X.509, OpenPGP, and is being developed in the IETF. The software is delivered as SILC Client for end users, SILC Server for system administrators, and SILC Toolkit for application developers.
Verwandte ProjekteDumpper v.60.3, Properties Editor, Win32 Disk Imager, MeCab, MPC-BE |
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).
Verwandte ProjekteGLOBALBASE PROJECT, Media Player Classic - Home Cinema, FreeStyleWiki, PukiWiki, TERASOLUNA Framework |
Dar is a shell command that makes backup of a directory tree and files. Its features include splitting archives over several files, DVD, CD, ZIP, or floppies, compression, full or differential backups, strong encryption, proper saving and restoration of hard links, extended attributes, file forks, Door inodes, and sparse files, remote backup using pipes and external commands (such as ssh), and rearrangement of the "slices" of an existing archive. It can run commands between slices, before and after saving some defined files or directories (for a proper database backup, for example), and quickly retrieve individual files from differential and full backups. Several external GUIs exist as alternatives to its CLI interface, like kdar, DarGUI, SaraB, etc.
Verwandte ProjekteMPC-BE, PeaZip, 7-Zip, Clonezilla, Media Player Classic - Home Cinema |
iptables is built on top of netfilter, the packet alteration framework for Linux 2.4.x and 2.6.x. It is a major rewrite of its predecessor ipchains, and is used to control packet filtering, Network Address Translation (masquerading, portforwarding, transparent proxying), and special effects such as packet mangling.
Verwandte ProjekteDumpper v.60.3, x64dbg, RMAC, UltraMonkey-L7, AKARI |
Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, sniffers, and malware. The application consists of the main shell script, a few text-based databases, and optional Perl scripts. It can recognise and run external applications like 'skdet' and 'unhide'. It should run on almost every Unix clone.
Verwandte ProjekteClonezilla, MPC-BE, Linux-HA Japan, Hinemos, Media Player Classic - Home Cinema |
segatex is a tool to configure SELinux policy with the help of a GUI. At the push of a button, it can generate a .te file in the /usr/share/segatex directory. You can then edit your .te file, make a module, and install. You can make any module name and edit current modules. You can install, update, and remove modules. You can semanage list and semanage login, fcontext, and port or set some domain permissive. You can download SELinux-related RPMs, including xguest, sepostgresql, and mod_selinux. You can download Fedora DVD or CDs. You can relabel your system. You can audit2allow by GUI. You can check refpolicy by analyzer. segatex includes its own policy.
Verwandte ProjekteDumpper v.60.3, SELinux for Japanese Users, Win32 Disk Imager, MPC-BE, MeCab |