Ports Search

Results 14,83114,840 of 18,669 for descr.zh_CN%3A%E9%81%8F%E5%88%B6%E5%9E%83%E5%9C%BE.(0.017 seconds)
security/ftimes-3.11.0 (Score: 3.7481335E-5)
System baselining and evidence collection tool
FTimes is a system baselining and evidence collection tool. Its primary purpose is to gather and/or develop topographical information and attributes about specified directories and files in a manner conducive to intrusion and forensic analysis. It was designed to support the following initiatives: content integrity monitoring, incident response, intrusion analysis, and computer forensics.
security/idea-1.2 (Score: 3.7481335E-5)
Command-line IDEA encryption and decryption utility
A command line idea encryption and decryption utility written by Dr. Richard De Moliner. IDEA (International Data Encryption Algorithm) is a block cipher devel- oped by Dr. Xuejia Lai and Prof. Dr. J. L. Massey at the Swiss Federal Institute of Technology.
security/flawfinder-1.31 (Score: 3.7481335E-5)
Examines source code looking for security weaknesses
Flawfinder searches through source code looking for potential security flaws. Flawfinder uses an internal database called the ``ruleset''; the ruleset identifies functions that are common causes of security flaws. Every potential security flaw found in a given source code file (matching an entry in the ruleset) is called a ``hit,'' and the set of hits found during any particular run is called the ``hitlist.''
security/ike-2.2.1 (Score: 3.7481335E-5)
Shrew Soft IKE daemon and client tools
This port contains the Shrew Soft IKE daemon and client tools. The software supports IKE V1 communications with an emphasis on client functionality. It was originally designed to complement a gateway running the ipsec-tools racoon daemon. The latest version offers a high level of compatibility with Cisco, Juniper, Zywall, Fortigate and many other commercial IPsec VPN gateways. For more information please visit ...
security/fragrouter-1.6 (Score: 3.7481335E-5)
Tool for testing network IDS implementations
Fragrouter is a program for routing network traffic in such a way as to elude most network intrusion detection systems. The attacks implemented correspond to those listed in the Secure Networks ``Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection'' paper of January, 1998.
security/openscep-0.4.2 (Score: 3.7481335E-5)
Open source scep server
OpenSCEP is an open source implementation of the SCEP protocol used by Cisco routers for certificate enrollment to build VPNs. It implements most of the draft specification. OpenSCEP includes a client and a server implementation, as well as some CGI programs to simplify certificate and revocation list management.
security/isnprober-1.02 (Score: 3.7481335E-5)
PenTest tool for TCP Initial Sequence Numbers research
-- ISNprober / Tom Vandepoel (Tom.Vandepoel@ubizen.com) -- ISNprober is a tool that samples TCP Initial Sequence Numbers or IP ID's and can use that information to determine if a set of IP addresses belong to the same TCP/IP stack (machine) or not.
security/keychain-2.8.2 (Score: 3.7481335E-5)
User-friendly front-end to ssh-agent(1)
Keychain is a shell script which acts as a user-friendly front-end to ssh-agent(1), allowing you to have one long-running ssh-agent process per system rather than per login session. Please study the documentation on the keychain website carefully since incorrect usage of this script may have certain security implications.
security/RSA-2.1.0.1 (Score: 3.7481335E-5)
Implementation of RSA, using the padding schemes of PKCS
This library implements the RSA encryption and signature algorithms for arbitrarily-sized ByteStrings. While the implementations work, they are not necessarily the fastest ones on the planet. Particularly key generation. The algorithms included are based of RFC 3447, or the Public-Key Cryptography Standard for RSA, version 2.1 (a.k.a, PKCS#1 v2.1).
security/afl-2.32 (Score: 3.7481335E-5)
Fast instrumented fuzzer
American fuzzy lop is a fuzzer that employs a novel type of compile-time instrumentation and genetic algorithms to automatically discover clean, interesting test cases that trigger new internal states in the targeted binary. This substantially improves the functional coverage for the fuzzed code.