pamtester is a tiny utility program to test the pluggable authentication
modules (PAM) facility, which is a de facto standard of unified authentication
management mechanism in many unices and similar OSes including Solaris, HP-UX,
*BSD, MacOSX and Linux.
While specifically designed to help PAM module authors to test their modules,
that might also be handy for system administrators interested in building a
centralised authentication system using common standards such as NIS, SASL and
LDAP.
PWman is a console application for managing passwords. It uses
GPG (gpgme) for encryption and authentication.
The python mhash module provides an interface for the mhash library.
The mhash library provides an easy way to access strong hashes such as
MD5, SHA1 and other algorithms.
Distributed session caching tools and APIs, primarily for SSL/TLS servers
though perhaps useful for other (non-SSL/TLS) circumstances. This also
includes a self-contained network abstraction library (libnal), and the
sslswamp SSL/TLS benchmark/test utility.
PyMe is a Python interface to GPGME library.
PyMe's development model is GPGME + Python + SWIG (just like m2crypto is
an OpenSSL + Python + SWIG) combination which means that most of the
functions and types are converted from C into Python automatically by SWIG.
In short, to be able to use PyMe you need to be familiar with GPGME.
The pyscard smartcard library is a framework for building smart card
aware applications in Python. The smartcard module is built on top of
the PCSC API Python wrapper module.
TLS Lite is a free python library that implements SSL 3.0, TLS 1.0, and TLS
1.1. TLS Lite supports non-traditional authentication methods such as SRP,
shared keys, and cryptoIDs in addition to X.509 certificates. TLS Lite is pure
Python, however it can access OpenSSL, cryptlib, pycrypto, and GMPY for faster
crypto operations. TLS Lite integrates with httplib, xmlrpclib, poplib,
imaplib, smtplib, SocketServer, asyncore, and Twisted.
[ excerpt from developer's web site ]
I2P is an anonymous overlay network - a network within a network.
It is intended to protect communication from dragnet surveillance
and monitoring by third parties such as ISPs.
I2P is used by many people who care about their privacy: activists,
oppressed people, journalists and whistleblowers, as well as the
average person.
No network can be "perfectly anonymous". The continued goal of I2P
is to make attacks more and more difficult to mount. Its anonymity
will get stronger as the size of the network increases and with
ongoing academic review.
Razorback is a framework for an intelligence driven security solution.
It consists of a Dispatcher at the core of the system, surrounded by
Nuggets of varying types.
Razorback is a framework for an intelligence driven security solution.
It consists of a Dispatcher at the core of the system, surrounded by
Nuggets of varying types.
This nugget handles archive decompression.