This little utility dumps MSRPC endpoint information from Windows
systems. Similar to the rpcdump program from Microsoft, but does not
need a DCE stack and so runs on Unixes. dcetest can be very useful
once inside a DMZ to fingerprint Windows machines on the network.
dcetest operates over TCP port 135. (Think of it as rpcinfo -p against
Windows)
The digest utility is a wrapper for the md5, sha1, sha256, sha384,
sha512, rmd160, tiger and whirlpool message digest algorithms (also
known as hashes, checksums or "fingerprints").
fprint_demo is a simple GTK+ application to demonstrate and
test libfprint's capabilities. It can be used to enroll new finger prints
as well as verify and delete existing data sets.
Fprintd is a D-Bus daemon that offers libfprint functionality over
the D-Bus interprocess communication bus. By adding this daemon
layer above libfprint, we solve various problems related to multiple
applications simultaneously competing for fingerprint readers.
While it is not very nice to think of a daemon being necessary in
this scenario, fprintd will be launched by D-Bus through the
activation mechanism. This means it is launched only when needed,
and additionally it will shut itself down after a period of inactivity.
(Text copied from link below.)
Fwipe is a secure file erasing program. fwipe0, which actually erases
your files, is immune to filenames containing spaces, carriage returns,
dashes, or any other special characters. You can use it in place of rm
in cron jobs, together with "find ... -print0". The output of fwipe0 is
specially designed to be parsed easily by machine, so it can be embedded
in other applications which need secure file erasure.
The IPv6 toolkit is a portable IPv6 security assessment suite produced
by Fernando Gont on behalf of the UK CPNI.
Keychain is a shell script which acts as a user-friendly front-end to
ssh-agent(1), allowing you to have one long-running ssh-agent process per
system rather than per login session.
Please study the documentation on the keychain website carefully since
incorrect usage of this script may have certain security implications.
KeyNote is a simple and flexible trust-management system designed to
work well for a variety of large- and small- scale Internet-based
applications. It provides a single, unified language for both local
policies and credentials. KeyNote policies and credentials, called
`assertions,' contain predicates that describe the trusted actions
permitted by the holders of specific public keys. KeyNote assertions
are essentially small, highly-structured programs. A signed
assertion, which can be sent over an untrusted network, is also
called a `credential assertion.' Credential assertions, which also
serve the role of certificates, have the same syntax as policy
assertions but are also signed by the principal delegating the trust.
This is an example implementation of the KeyNote Trust-Management System
as specified in IETF draft <draft-blaze-ietf-trustmgt-keynote-02.txt>.
Generic cryptography public keys algorithm types.
Simple random generators API for cryptography related code.