This package contains everything that you need to use a cryptographic
package that supports the crypto-api package using conduits from the
conduit package.
Integrit is an alternative to file integrity verification programs
like tripwire and aide. It helps you determine whether an intruder
has modified a computer system.
An automated password generator, using several strong algorithms
for random and/or pronounceable password generation, and a built-in
pseudo-random number generator.
Ophcrack is a Windows password cracker based on a time-memory trade-off
using rainbow tables. This is a new variant of Hellman's original trade-off,
with better performance. It recovers 99.9% of alphanumeric passwords in
seconds. Features:
- Runs on Windows, GNU/Linux, FreeBSD, Mac OS X, etc.
- Cracks LM and NTLM hashes
- Free tables available for alphanumeric LM hashes
- Brute-force module for simple passwords
- Audit mode and CSV export
- Real-time graphs to analyze passwords (optional)
- Loads hashes from local and remote SAM
- Loads hashes from encrypted SAM recovered from a Windows partition,
Vista included
- Supports soon to be released XP flash and Vista eight XL tables
Gnome-keyring is a program that keep password and other secrets for
users. The library libgnome-keyring is used by applications to integrate
with the gnome keyring system.
libssh2 is a client-side C library implementing the SSH2 protocol. It supports
regular terminal, SCP and SFTP sessions; port forwarding; password, key-based
and keyboard-interactive authentication.
obfsclient is a C++11 Tor-managed pluggable transport client
implementation of the following protocols:
obfs2 - The Twobfuscator
obfs3 - The Threebfuscator
ScrambleSuit - Experimental
MUNGE (MUNGE Uid 'N' Gid Emporium) is an authentication service for creating and
validating credentials. It is designed to be highly scalable for use in an HPC
cluster environment. It allows a process to authenticate the UID and GID of
another local or remote process within a group of hosts having common users and
groups. These hosts form a security realm that is defined by a shared
cryptographic key. Clients within this security realm can create and validate
credentials without the use of root privileges, reserved ports, or
platform-specific methods.
Search data on a harddisk/partition/file, extract the part you are interested
in, and write it back after you modified it.
Medusa is intended to be a speedy, massively parallel, modular, login
brute-forcer. The goal is to support as many services which allow remote
authentication as possible.