Ports Search

Results 7,4617,470 of 18,669 for descr.zh_CN%3A%E9%81%8F%E5%88%B6%E5%9E%83%E5%9C%BE.(0.012 seconds)
security/origami-2.0.0 (Score: 2.0570685E-4)
Ruby framework to parse analyze and forge PDF documents
Origami is NOT a PDF rendering library. It aims at providing a scripting tool to generate and analyze malicious PDF files. As well, it can be used to create on-the-fly customized PDFs, or to inject (evil) code into already existing documents. - Create PDF documents from scratch. - Parse existing documents, modify them and recompile them. - Explore documents at the object level, going deep into the document structure, uncompressing PDF object streams and desobfuscating names and strings. - High-level operations, such as encryption/decryption, signature, file attachments... - A GTK interface to quickly browse into the document contents.
security/nessus-plugins-2.2.9 (Score: 2.0570685E-4)
Plugins for Nessus, the security scanner
Nessus is a security scanner. That is, it's a program which will scan a given network and will seek for vulnerabilities which could be exploited by some remote intruder. The Nessus Project was originally started by Renaud Deraison (deraison@worldnet.fr). Many people contributed in many ways to the project, and the Nessus core team is now made up of Alexis de Bernis (alexisb@mygale.org), who is the Java specialist, Noam Rathaus (dolittle@isrealmail.com) who is in charge of the Nessus client for Windows, and Renaud Deraison who is still here and who is the project leader.
security/openvpn-201623 (Score: 2.0570685E-4)
Secure IP/Ethernet tunnel daemon
OpenVPN is a robust, scalable and highly configurable VPN (Virtual Private Network) daemon which can be used to securely link two or more private networks using an encrypted tunnel over the internet. It can operate over UDP or TCP, can use SSL or a pre-shared secret to authenticate peers, and in SSL mode, one server can handle many clients. This development port is updated frequently and is likely NOT STABLE. This is an untested tar of the source tree. We attempt to omit inoperable states, but there is a good chance this program will not run. DO NOT USE IN PRODUCTION WITHOUT CAUTION
security/Crypt-AppleTwoFish-0.051 (Score: 2.0570685E-4)
Perl extension for Apple iTMS internal key descrambling algorithm
This code appears to have only cursory resemblance to Bruce Schneier's blowfish and twofish algorithms in that it too has a table-based decoder. Derivation from FairKeys code by Jon Lech Johanson at nanocrew.net. If you don't know what that is, don't bother looking here further. This is a Pure Perl implementation. I doubt there is any need for xs coding for what would mainly be processing 16 bytes at a time. This code is part of an ongoing effort to clone portions of the Apple iTMS in Perl for portability. See www.hymn-project.org for prior efforts by others.
security/suhosin-0.9.38 (Score: 2.0570685E-4)
PHP extension that implements high-level protections
Suhosin is an advanced protection system for PHP installations. It was designed to protect servers and users from known and unknown flaws in PHP applications and the PHP core. Suhosin comes in two independent parts, that can be used separately or in combination. The first part is a small patch against the PHP core, that implements a few low-level protections against bufferoverflows or format string vulnerabilities and the second part is a powerful PHP extension that implements all the other protections. Suhosin is binary compatible to normal PHP installation, which means it is compatible to 3rd party binary extension like ZendOptimizer.
security/certbot-0.8.1 (Score: 2.0570685E-4)
Let's Encrypt client
In short: getting and installing SSL/TLS certificates made easy. The Let's Encrypt Client is a tool to automatically receive and install X.509 certificates to enable TLS on servers. The client will interoperate with the Let's Encrypt CA which will be issuing browser-trusted certificates for free. It's all automated: The tool will prove domain control to the CA and submit a CSR (Certificate Signing Request). If domain control has been proven, a certificate will get issued and the tool will automatically install it.
security/python-registry-1.2.0 (Score: 2.0570685E-4)
Read access to Windows Registry files
python-registry was originally written by Willi Ballenthin, a forensicator who wanted to access the contents of the Windows Registry from his Linux laptop. python-registry currently provides read-only access to Windows Registry files, such as NTUSER.DAT, userdiff, and SOFTWARE. The interface is two-fold: a high-level interface suitable for most tasks, and a low level set of parsing objects and methods which may be used for advanced study of the Windows Registry. python-registry is written in pure Python, making it portable across all major platforms.
security/truecrypt-7.1a (Score: 2.0570685E-4)
Free open-source disk encryption software
Free open-source disk encryption software Main Features: * Creates a virtual encrypted disk within a file and mounts it as a real disk. * Encrypts an entire partition or storage device such as USB flash drive or hard drive. * Encryption is automatic, real-time (on-the-fly) and transparent. * Parallelization and pipelining allow data to be read and written as fast as if the drive was not encrypted. * Provides plausible deniability, in case an adversary forces you to reveal the password: Hidden volume (steganography) and hidden operating system.
sysutils/freeipmi-1.5.2 (Score: 2.0570685E-4)
Library and tools to support IPMI-capable hardware
FreeIPMI provides in-band and out-of-band IPMI software based on the IPMI v1.5/2.0 specification. The IPMI specification defines a set of interfaces for platform management and is implemented by a number vendors for system management. The features of IPMI that most users will be interested in are sensor monitoring, system event monitoring, power control, and serial-over-LAN (SOL). The FreeIPMI tools and libraries should provide users with the ability to access and utilize these and many other features. A number of useful features for large HPC or cluster environments have also been implemented into FreeIPMI.
sysutils/bsdcrashtar-0.1.3 (Score: 2.0570685E-4)
Archive FreeBSD kernel crash files
The bsdcrashtar utility creates tar a archive that contains all files needed for debugging FreeBSD kernel crash (vmcore, kernel, loaded modules, sources that appear in backtrace). This is useful for debugging a crash on another host, sending it to developers or if you are going to upgrade the kernel on crashed host but would like to keep crashdump in case the developers ask you to provide additional info. Created tar archive contains also a script that when being run inside unpacked archive will give kgdb(1) session with crash core loaded in it. The script should be run with root privileges because it does chroot(8) before starting kgdb(1).