Ports Search

Results 10,97110,980 of 17,754 for %E6%8E%A7%E5%88%B6%E5%8F%B0.(0.013 seconds)
science/scipy-0.16.1 (Score: 7.3261835E-5)
Scientific tools for Python
SciPy is an open source library of scientific tools for Python. SciPy supplements the popular Numpy module, gathering a variety of high level science and engineering modules together as a single package. SciPy includes modules for graphics and plotting, optimization, integration, special functions, signal and image processing, genetic algorithms, ODE solvers, and others.
security/ADMsnmp-0.1 (Score: 7.3261835E-5)
SNMP audit scanner
ADMsnmp is an snmpd audit scanner. ADMsnmp can brute force the snmp community name (with a wordfile) or make a wordfile list derived the hostname. ADMsnmp can report to you all valid community names found and inform you if writable access to the MIB has been attained. ADMsnmp is very easy to use and designed with speed in mind!
security/cyrus-sasl-2.1.26 (Score: 7.3261835E-5)
SASL authentication server for cyrus-sasl2
saslauthd is a daemon process that handles plaintext authentication requests on behalf of the SASL library. The server fulfills two roles: it isolates all code requiring superuser privileges into a single process, and it can be used to provide proxy authentication services to clients that do not understand SASL based authentication.
security/dcetest-1.2 (Score: 7.3261835E-5)
Utility to dump MSRPC endpoint information from Windows systems
This little utility dumps MSRPC endpoint information from Windows systems. Similar to the rpcdump program from Microsoft, but does not need a DCE stack and so runs on Unixes. dcetest can be very useful once inside a DMZ to fingerprint Windows machines on the network. dcetest operates over TCP port 135. (Think of it as rpcinfo -p against Windows)
security/fakeroot-1.20.2 (Score: 7.3261835E-5)
Simulate the root user behaviour
Fakeroot runs a command in an environment were it appears to have root privileges for file manipulation, by setting LD_PRELOAD to a library with alternative versions of getuid(), stat(), etc. This is useful for allowing users to create archives (tar, ar, .deb .rpm etc.) with files in them with root permissions/ownership.
security/cksfv-1.3.14 (Score: 7.3261835E-5)
Create or manipulate Simple File Verification (SFV) checksum files
The Simple File Verification (SFV) system is a file integrity verification system which is popular on some platforms. A software package may be accompanied by an SFV file (usually with extension .sfv) which contains CRC-32 checksums for all the files that comprise the package. cksfv (Check SFV) can both create simple file verification (SFV) files, and test file integrity against existing SFV files.
security/ftimes-3.11.0 (Score: 7.3261835E-5)
System baselining and evidence collection tool
FTimes is a system baselining and evidence collection tool. Its primary purpose is to gather and/or develop topographical information and attributes about specified directories and files in a manner conducive to intrusion and forensic analysis. It was designed to support the following initiatives: content integrity monitoring, incident response, intrusion analysis, and computer forensics.
security/gnutls-0.2 (Score: 7.3261835E-5)
Bindings for GNU libgnutls
You almost certainly don't want to depend on this release. This is a pre-alpha, almost useless release; its only purpose is to enable TLS support in some of my other libraries. More complete bindings for GNU TLS will be released at a later date.
security/idea-1.2 (Score: 7.3261835E-5)
Command-line IDEA encryption and decryption utility
A command line idea encryption and decryption utility written by Dr. Richard De Moliner. IDEA (International Data Encryption Algorithm) is a block cipher devel- oped by Dr. Xuejia Lai and Prof. Dr. J. L. Massey at the Swiss Federal Institute of Technology.
security/flawfinder-1.31 (Score: 7.3261835E-5)
Examines source code looking for security weaknesses
Flawfinder searches through source code looking for potential security flaws. Flawfinder uses an internal database called the ``ruleset''; the ruleset identifies functions that are common causes of security flaws. Every potential security flaw found in a given source code file (matching an entry in the ruleset) is called a ``hit,'' and the set of hits found during any particular run is called the ``hitlist.''