Origami is NOT a PDF rendering library. It aims at providing a scripting tool
to generate and analyze malicious PDF files. As well, it can be used to create
on-the-fly customized PDFs, or to inject (evil) code into already existing
documents.
- Create PDF documents from scratch.
- Parse existing documents, modify them and recompile them.
- Explore documents at the object level, going deep into the document
structure, uncompressing PDF object streams and desobfuscating names and
strings.
- High-level operations, such as encryption/decryption, signature, file
attachments...
- A GTK interface to quickly browse into the document contents.
Nessus is a security scanner. That is, it's a program which will scan a
given network and will seek for vulnerabilities which could be exploited
by some remote intruder.
The Nessus Project was originally started by Renaud Deraison
(deraison@worldnet.fr). Many people contributed in many ways to the
project, and the Nessus core team is now made up of Alexis de Bernis
(alexisb@mygale.org), who is the Java specialist, Noam Rathaus
(dolittle@isrealmail.com) who is in charge of the Nessus client for
Windows, and Renaud Deraison who is still here and who is the project
leader.
OpenVPN is a robust, scalable and highly configurable VPN (Virtual Private
Network) daemon which can be used to securely link two or more private networks
using an encrypted tunnel over the internet. It can operate over UDP or TCP,
can use SSL or a pre-shared secret to authenticate peers, and in SSL mode, one
server can handle many clients.
This development port is updated frequently and is likely NOT STABLE. This is
an untested tar of the source tree. We attempt to omit inoperable states, but
there is a good chance this program will not run.
DO NOT USE IN PRODUCTION WITHOUT CAUTION
This code appears to have only cursory resemblance to Bruce Schneier's
blowfish and twofish algorithms in that it too has a table-based decoder.
Derivation from FairKeys code by Jon Lech Johanson at nanocrew.net.
If you don't know what that is, don't bother looking here further. This is
a Pure Perl implementation. I doubt there is any need for xs coding for
what would mainly be processing 16 bytes at a time. This code is part of an
ongoing effort to clone portions of the Apple iTMS in Perl for portability.
See www.hymn-project.org for prior efforts by others.
Suhosin is an advanced protection system for PHP installations.
It was designed to protect servers and users from known and
unknown flaws in PHP applications and the PHP core.
Suhosin comes in two independent parts, that can be used
separately or in combination. The first part is a small patch
against the PHP core, that implements a few low-level
protections against bufferoverflows or format string
vulnerabilities and the second part is a powerful PHP extension
that implements all the other protections.
Suhosin is binary compatible to normal PHP installation,
which means it is compatible to 3rd party binary extension
like ZendOptimizer.
In short: getting and installing SSL/TLS certificates made easy.
The Let's Encrypt Client is a tool to automatically receive and install
X.509 certificates to enable TLS on servers. The client will
interoperate with the Let's Encrypt CA which will be issuing
browser-trusted certificates for free.
It's all automated:
The tool will prove domain control to the CA and submit a CSR
(Certificate Signing Request).
If domain control has been proven, a certificate will get issued and
the tool will automatically install it.
python-registry was originally written by Willi Ballenthin, a forensicator who
wanted to access the contents of the Windows Registry from his Linux laptop.
python-registry currently provides read-only access to Windows Registry files,
such as NTUSER.DAT, userdiff, and SOFTWARE. The interface is two-fold: a
high-level interface suitable for most tasks, and a low level set of parsing
objects and methods which may be used for advanced study of the Windows
Registry. python-registry is written in pure Python, making it portable across
all major platforms.
Free open-source disk encryption software
Main Features:
* Creates a virtual encrypted disk within a file and mounts it as
a real disk.
* Encrypts an entire partition or storage device such as USB flash
drive or hard drive.
* Encryption is automatic, real-time (on-the-fly) and transparent.
* Parallelization and pipelining allow data to be read and written
as fast as if the drive was not encrypted.
* Provides plausible deniability, in case an adversary forces you
to reveal the password:
Hidden volume (steganography) and hidden operating system.
FreeIPMI provides in-band and out-of-band IPMI software based on the IPMI
v1.5/2.0 specification. The IPMI specification defines a set of interfaces for
platform management and is implemented by a number vendors for system
management. The features of IPMI that most users will be interested in are
sensor monitoring, system event monitoring, power control, and serial-over-LAN
(SOL). The FreeIPMI tools and libraries should provide users with the ability to
access and utilize these and many other features. A number of useful features
for large HPC or cluster environments have also been implemented into FreeIPMI.
The bsdcrashtar utility creates tar a archive that contains all files needed
for debugging FreeBSD kernel crash (vmcore, kernel, loaded modules, sources
that appear in backtrace). This is useful for debugging a crash on another
host, sending it to developers or if you are going to upgrade the kernel on
crashed host but would like to keep crashdump in case the developers ask you to
provide additional info.
Created tar archive contains also a script that when being run inside unpacked
archive will give kgdb(1) session with crash core loaded in it. The script
should be run with root privileges because it does chroot(8) before starting
kgdb(1).