Ports Search

Results 3,5713,580 of 5,824 for /net/.(0.004 seconds)
security/hashcat-3.10 (Score: 0.01987111)
Advanced CPU-based password recovery utility
Hashcat is an advanced CPU-based password recovery utility for FreeBSD, Windows 7/8/10, Apple OS X, and GNU/Linux, supporting seven unique modes of attack for over 100 optimized hashing algorithms.
security/cfv-1.18.3 (Score: 0.01987111)
Utility to both test and create .sfv, .csv, and md5sum files
cfv is a utility to both test and create .sfv, .csv and md5sum files. These files are commonly used to ensure the correct retrieval or storage of data. Features: - supports .sfv, .csv(2, 3, and 4 field variants), md5sum, BSD md5 sha1sum, .torrent and (test-only) .par, .par2 file formats - automatic checksum file naming ability in create mode - recursive operation - show unverified files option - ignore case and fix path separator options for cross platform use - transparent gzip support for checksum files - configurable renaming of bad files (with testing against previous bad files, to save only unique differing copies)
security/pamtester-0.1.2 (Score: 0.01987111)
Command line pam authentication tester
pamtester is a tiny utility program to test the pluggable authentication modules (PAM) facility, which is a de facto standard of unified authentication management mechanism in many unices and similar OSes including Solaris, HP-UX, *BSD, MacOSX and Linux. While specifically designed to help PAM module authors to test their modules, that might also be handy for system administrators interested in building a centralised authentication system using common standards such as NIS, SASL and LDAP.
security/pwman-0.4.4 (Score: 0.01987111)
Console password management application based on gpg(me)
PWman is a console application for managing passwords. It uses GPG (gpgme) for encryption and authentication.
security/mhash-1.4 (Score: 0.01987111)
Python mhash module
The python mhash module provides an interface for the mhash library. The mhash library provides an easy way to access strong hashes such as MD5, SHA1 and other algorithms.
security/distcache-1.4.5 (Score: 0.01987111)
Distributed OpenSSL session caching tools
Distributed session caching tools and APIs, primarily for SSL/TLS servers though perhaps useful for other (non-SSL/TLS) circumstances. This also includes a self-contained network abstraction library (libnal), and the sslswamp SSL/TLS benchmark/test utility.
security/pyme-0.8.1 (Score: 0.01987111)
Python interface to GPGME library
PyMe is a Python interface to GPGME library. PyMe's development model is GPGME + Python + SWIG (just like m2crypto is an OpenSSL + Python + SWIG) combination which means that most of the functions and types are converted from C into Python automatically by SWIG. In short, to be able to use PyMe you need to be familiar with GPGME.
security/pyscard-1.9.4 (Score: 0.01987111)
Smartcard module for Python
The pyscard smartcard library is a framework for building smart card aware applications in Python. The smartcard module is built on top of the PCSC API Python wrapper module.
security/tlslite-0.4.9 (Score: 0.01987111)
Python module implementing SSL 3.0, TLS 1.0, and TLS 1.1
TLS Lite is a free python library that implements SSL 3.0, TLS 1.0, and TLS 1.1. TLS Lite supports non-traditional authentication methods such as SRP, shared keys, and cryptoIDs in addition to X.509 certificates. TLS Lite is pure Python, however it can access OpenSSL, cryptlib, pycrypto, and GMPY for faster crypto operations. TLS Lite integrates with httplib, xmlrpclib, poplib, imaplib, smtplib, SocketServer, asyncore, and Twisted.
security/i2p-0.9.16 (Score: 0.01987111)
Anonymizing network
[ excerpt from developer's web site ] I2P is an anonymous overlay network - a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs. I2P is used by many people who care about their privacy: activists, oppressed people, journalists and whistleblowers, as well as the average person. No network can be "perfectly anonymous". The continued goal of I2P is to make attacks more and more difficult to mount. Its anonymity will get stronger as the size of the network increases and with ongoing academic review.