Pond is not email. Pond is forward secure, asynchronous messaging for the
discerning. Pond messages are asynchronous, but are not a record; they expire
automatically a week after they are received. Pond seeks to prevent leaking
traffic information against everyone except a global passive attacker.
Pond is experimental software! DO NOT USE IT FOR ANYTHING REAL!!!
Use security/gnupg instead.
This Python package is a high-level wrapper for Kerberos (GSSAPI) operations.
The goal is to avoid having to build a module that wraps the entire
Kerberos.framework, and instead offer a limited set of functions that do what is
needed for client/server Kerberos authentication based on
<http://www.ietf.org/rfc/rfc4559.txt>.
PySAML2 is a pure python implementation of SAML2. It contains all necessary
pieces for building a SAML2 service provider or an identity provider. The
distribution contains examples of both. Originally written to work in a WSGI
environment there are extensions that allow you to use it with other frameworks.
It will transparently hijack HTTP traffic on a network, watch for HTTPS links
and redirects, then map those links into either look-alike HTTP links or
homograph-similar HTTPS links. It also supports modes for supplying a
favicon which looks like a lock icon, selective logging, and session denial.
The python bindings for yara.
"YARA is a tool aimed at helping malware researchers to identify and classify
malware samples. With YARA you can create descriptions of malware families
based on textual or binary patterns contained on samples of those families.
Each description consists of a set of strings and a Boolean expression which
determines its logic."
Radamsa is a generic test case generator for robustness testing, aka a fuzzer.
It can be used to test how well a program can stand malformed and potentially
malicious inputs. It operates on given sample inputs and thus requires minimal
effort to set up.
Seahorse is a Gnome front end for GnuPG - the Gnu Privacy Guard program.
It is a tool for secure communications and data storage.
Data encryption and digital signature creation can easily
be performed through a GUI and Key Management operations
can easily be carried out through an intuitive interface.
SSHBlock is a daemon to monitor a syslog log for break-in attempts using
SSH, and to automatically block bad hosts by adding lines to /etc/hosts.allow
(TCP Wrappers). Several thresholds are pre-defined, to be able to block those
trying many attempts within a longer or shorter period.
SSLsplit is a tool for man-in-the-middle attacks against SSL/TLS encrypted
network connections. Connections are transparently intercepted through a
network address translation engine and redirected to SSLsplit. SSLsplit
terminates SSL/TLS and initiates a new SSL/TLS connection to the original
destination address, while logging all data transmitted. SSLsplit is intended
to be useful for network forensics and penetration testing.
Provide a fast way to delete entries from OpenSSH's known_hosts
file. This is a simple automation of the things normally done by
the user when having an "offending key" in his/her known_hosts file
caused by a changing host key of the destination.