Avcheck is a simple program that allows you to call an antivirus
software in order to check mail messages for viruses before actual
delivery from within a Mail Transfer Agent, or MTA.
Avcheck itself isn't a virusscanner, nor it is an MTA. It sits between
the MTA and a real antivirus software. Most MTAs available today can
call an external program for every mail message in order to perform
various tasks, including virus scanning and content filtering. Avcheck
can be used as that external program.
Avcheck will receive a mail message from a mail system, pass it to an
antivirus software, and, depending on the presence of a virus in that
message, will either allow the message to be delivered or take
appropriate actions to handle infected mail.
Avcheck does nothing with a mail message contents -- it's task is to
prepare file with a mail message and feed it to an antivirus
progra. It's an antivirus task to decode MIME structure, handle
embedded archives and so on. Many but not all antivirus products today
have this ability.
A native MD5 implementation in Common Lisp.
This package is compiled with SBCL.
John the Ripper is a fast password cracker, currently available for many
flavors of Unix (eleven are officially supported, not counting different
architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to
detect weak Unix passwords. Besides several crypt(3) password hash types
most commonly found on various Unix flavors, supported out of the box are
Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with
contributed patches (over 40 of additional hash and cipher types).
OpenConnect is a client for Cisco's AnyConnect SSL VPN. Beyond
Cisco's official client, OpenConnect supports multiple platforms,
NetworkManager integration, and the ability to run as a user.
libPJL- Printer Job Language library
A library and a command-line tool to use PJL- HP Printer Job Language
Off-the-Record (OTR) Messaging allows you to have private
conversations over instant messaging by providing:
* Encryption
No one else can read your instant messages.
* Authentication
You are assured the correspondent is who you think it is.
* Deniability
The messages you send do not have digital signatures that
are checkable by a third party. Anyone can forge messages
after a conversation to make them look like they came from
you. However, during a conversation, your correspondent is
assured the messages he sees are authentic and unmodified.
* Perfect forward secrecy
If you lose control of your private keys, no previous
conversation is compromised.
This is a collection of simple PIN or passphrase entry dialogs which
utilize the Assuan protocol as described by the aegypten project.
python-registry was originally written by Willi Ballenthin, a forensicator who
wanted to access the contents of the Windows Registry from his Linux laptop.
python-registry currently provides read-only access to Windows Registry files,
such as NTUSER.DAT, userdiff, and SOFTWARE. The interface is two-fold: a
high-level interface suitable for most tasks, and a low level set of parsing
objects and methods which may be used for advanced study of the Windows
Registry. python-registry is written in pure Python, making it portable across
all major platforms.
The Rekall Framework is a completely open collection of tools, implemented in
Python under the GNU General Public License, for the extraction of digital
artifacts from volatile memory (RAM) samples. The extraction techniques are
performed completely independent of the system being investigated but offer
visibility into the runtime state of the system. The framework is intended to
introduce people to the techniques and complexities associated with extracting
digital artifacts from volatile memory samples and provide a platform for
further work into this exciting area of research.
The Rekall Framework is a completely open collection of tools, implemented in
Python under the GNU General Public License, for the extraction of digital
artifacts from volatile memory (RAM) samples. The extraction techniques are
performed completely independent of the system being investigated but offer
visibility into the runtime state of the system. The framework is intended to
introduce people to the techniques and complexities associated with extracting
digital artifacts from volatile memory samples and provide a platform for
further work into this exciting area of research.