Ports Search

Results 4,2114,220 of 8,048 for www%3Atrac.(0.005 seconds)
security/metasploit-4.12.28 (Score: 0.005581701)
Exploit-Framework for Penetration-Testing
The Metasploit Framework The Metasploit Framework is an open source platform that supports vulnerability research, exploit development, and the creation of custom security tools. The goal is to provide useful information to people who perform penetration testing, IDS signature development, and exploit research. This site was created to fill the gaps in the information publicly available on various exploitation techniques and to create a useful resource for exploit developers. The tools and information on this site are provided for legal penetration testing and research purposes only.
security/govpn-6.0 (Score: 0.005581701)
Simple secure, DPI-resistant VPN daemon
GoVPN is simple secure free software virtual private network daemon, aimed to be reviewable, secure, DPI/censorship-resistant, written on Go. It uses fast strong passphrase authenticated key agreement protocol with augmented zero-knowledge mutual peers authentication (PAKE DH A-EKE). Encrypted, authenticated data transport that hides message's length and timestamps. Optional encryptionless mode, that still preserves data confidentiality. Perfect forward secrecy property. Resistance to: offline dictionary attacks, replay attacks, client's passphrases compromising and dictionary attacks on the server side. Built-in heartbeating, rehandshaking, real-time statistics. Ability to work through UDP, TCP and HTTP proxies. IPv4/IPv6-compatibility.
security/openvas-libraries-8.0.7 (Score: 0.005581701)
OpenVAS libraries
The Open Vulnerability Assessment System (OpenVAS) is a framework of several services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management solution. This package contains core libraries.
security/snort-2.9.8.3 (Score: 0.005581701)
Lightweight network intrusion detection system
Snort is a libpcap-based packet sniffer/logger which can be used as a lightweight network intrusion detection system. It features rules based logging and can perform content searching/matching in addition to being used to detect a variety of other attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, and much more. Snort has a real-time alerting capability, with alerts being sent to syslog, a separate "alert" file, or even to a Windows computer via Samba. Packets are logged in their decoded form to directories which are generated based upon the IP address of the remote peer. This allows Snort to be used as a sort of "poor man's intrusion detection system" if you specify what traffic you want to record and what to let through. For instance, I use it to record traffic of interest to the six computers in my office at work while I'm away on travel or gone for the weekend. It's also nice for debugging network code since it shows you most of the Important Stuff(TM) about your packets (as I see it anyway). The code is pretty easy to modify to provide more complete packet decoding, so feel free to make suggestions.
security/snortsam-2.70 (Score: 0.005581701)
SnortSam is a output plugin for Snort
SnortSam is an intelligent agent that allows the popular open-source Intrusion Detection System called Snort to block intruding connections by reconfiguration of many firewalls and Cisco devices.
security/softether-4.18.9570 (Score: 0.005581701)
Softether VPN solution
SoftEther VPN ("SoftEther" means "Software Ethernet") is a powerful, multi-OS and easy-to-use multi-protocol VPN software. It supports SSL-VPN (HTTPS), as well as OpenVPN, IPsec, L2TP, MS-SSTP, L2TPv3 and EtherIP tunneling protocols and has a clone function to support OpenVPN clients.
security/spike-proxy-1.4.8 (Score: 0.005581701)
Tool looking for vulnerabilities in web applications
Not all web applications are built in the same ways, and hence, many must be analyzed individually. SPIKE Proxy is a professional-grade tool for looking for application-level vulnerabilities in web applications. SPIKE Proxy covers the basics, such as SQL Injection and cross-site-scripting, but it's completely open Python infrastructure allows advanced users to customize it for web applications that other tools fall apart on.
security/spybye-0.3 (Score: 0.005581701)
Web proxy to detect malware
SpyBye is a tool to help web masters determine if their web pages are hosting browser exploits that can infect visiting users with malware. It functions as an HTTP proxy server and intercepts all browser requests. SpyBye uses a few simple rules to determine if embedded links on your web page are harmlesss, unknown or maybe even dangerous. SpyBye analyzes all downloads in the background and provides you with a warning notification whenever it encounters content that is potentially malicious. At that point, you can click on the link in the notification and receive a more detailed analysis of the web page.
security/libgcrypt-1.7.3 (Score: 0.005581701)
General purpose crypto library based on code used in GnuPG
Libgcrypt is a general purpose crypto library based on the code used in GnuPG.
security/truecrypt-7.1a (Score: 0.005581701)
Free open-source disk encryption software
Free open-source disk encryption software Main Features: * Creates a virtual encrypted disk within a file and mounts it as a real disk. * Encrypts an entire partition or storage device such as USB flash drive or hard drive. * Encryption is automatic, real-time (on-the-fly) and transparent. * Parallelization and pipelining allow data to be read and written as fast as if the drive was not encrypted. * Provides plausible deniability, in case an adversary forces you to reveal the password: Hidden volume (steganography) and hidden operating system.