Ports Search

Results 14,61114,620 of 17,754 for %E6%8E%A7%E5%88%B6%E5%8F%B0.(0.013 seconds)
security/oidentd-2.0.8 (Score: 5.4946377E-5)
Ident server that supports user-defined ident strings
From the README: "oidentd is an ident (rfc1413 compliant) daemon that runs on Linux, FreeBSD, OpenBSD and Solaris. oidentd can handle IP masqueraded/NAT connections on Linux, FreeBSD (ipf only) and OpenBSD. oidentd has a flexible mechanism for specifying ident responses. Users can be granted permission to specify their own ident responses. Responses can be specified according to host and port pairs." FreeBSD's inetd has a built-in ident service which can also generate bogus responses. Please see the TODO file for more information on why only ipf is supported under FreeBSD. Mark Laws mdl@60hz.org
security/shibboleth-sp-2.6.0 (Score: 5.4946377E-5)
C++ Shibboleth Service Provider (Internet2) for Apache
Shibboleth is standards-based, open source middleware software which provides Web Single SignOn (SSO) across or within organizational boundaries. It allows sites to make informed authorization decisions for individual access of protected online resources in a privacy-preserving manner. This software is a C++ implementation of the Service Provider version 2 component of the Shibboleth can be used in Apache Web servers. The service provider manages secured resources. User access to resources is based on assertions received by the service provider (SP) from an identity provider.
Extensible authentication framework for Dancer2 apps
A user authentication and authorisation framework plugin for Dancer2 apps. Makes it easy to require a user to be logged in to access certain routes, provides role-based access control, and supports various authentication methods/sources (config file, database, Unix system users, etc). Designed to support multiple authentication realms and to be as extensible as possible, and to make secure password handling easy (the base class for auth providers makes handling `RFC2307'-style hashed passwords really simple, so you have no excuse for storing plain-text passwords).
security/Crypt-Password-Util-0.17 (Score: 5.4946377E-5)
Crypt password utilities
Crypt::Password::Util is a crypt password utilities. Its crypt($str) works like Perl's crypt(), but automatically choose the appropriate crypt type and random salt. Will first choose SSHA512 with 64-bit random salt. If not supported by system, fall back to MD5-CRYPT with 32-bit random salt. If that is not supported, fall back to CRYPT. Its crypt_type($str) returns crypt type, or undef if $str does not look like a crypted password. Currently known types: CRYPT (traditional DES crypt), MD5-CRYPT (including Apache variant), SSHA256 (salted SHA256), SSHA512 (salted SHA512), and PLAIN-MD5. See also Authen::Passphrase which recognizes more encodings (but currently not SSHA256 and SSHA512).
security/Crypt-SKey-0.10 (Score: 5.4946377E-5)
Perl S/Key calculator
This module contains a simple S/Key calculator (as described in RFC 1760) implemented in Perl. It exports the function `key' by default, and may optionally export the function `compute'. `compute_md4', `compute_md5', `key_md4', and `key_md5' are provided as convenience functions for selecting either MD4 or MD5 hashes. The default is MD4; this may be changed with with the `$Crypt::SKey::HASH' variable, assigning it the value of `MD4' or `MD5'. You can access any of these functions by exporting them in the same manner as `compute' in the above example. Most S/Key systems use MD4 hashing, but a few (notably OPIE) use MD5.
security/Net-SinFP-2.09 (Score: 5.4946377E-5)
Full operating system stack fingerprinting suite
SinFP is a new approach to OS fingerprinting, which bypasses limitations that nmap has. Nmap approaches to fingerprinting as shown to be efficient for years. Nowadays, with the omni-presence of stateful filtering devices, PAT/NAT configurations and emerging packet normalization technologies, its approach to OS fingerprinting is becoming to be obsolete. SinFP uses the aforementioned limitations as a basis for tests to be obsolutely avoided in used frames to identify accurately the remote operating system. That is, it only requires one open TCP port, sends only fully standard TCP packets, and limits the number of tests to 2 or 3 (with only 1 test giving the OS reliably in most cases).
security/gnupg-2.0.2 (Score: 5.4946377E-5)
Python wrapper for GnuPG
This module allows easy access to GnuPG's key management, encryption and signature functionality from Python programs, by interacting with GnuPG through file descriptors. Input arguments are strictly checked and sanitised, and therefore this module should be safe to use in networked applications requiring direct user input. It is intended for use with Python 2.6 or greater. This is a fork of python-gnupg-0.3.2, patched to fix a potential vulnerability which could result in remote code execution, do to unsanitised inputs being passed to subprocess.Popen([...], shell=True).
security/pycryptodome-3.4 (Score: 5.4946377E-5)
Cryptographic library for Python
PyCryptodome is a fork of PyCrypto. It brings the following enhancements with respect to the last official version of PyCrypto (2.6.1): * Authenticated encryption modes (GCM, CCM, EAX, SIV, OCB) * Accelerated AES on Intel platforms via AES-NI * First class support for PyPy * SHA-3 (including SHAKE XOFs) and BLAKE2 hash algorithms * Salsa20 and ChaCha20 stream ciphers * scrypt and HKDF * Deterministic DSA * Password-protected PKCS#8 key containers * Shamir's Secret Sharing scheme * Random numbers get sourced directly from the OS (and not from a CSPRNG in userspace) * Simplified install process, including better support for Windows * Cleaner RSA and DSA key generation (largely based on FIPS 186-4) * Major clean ups and simplification of the code base
security/rekall-core-1.5.2.p1 (Score: 5.4946377E-5)
CORE component of the Rekall framework
The Rekall Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely independent of the system being investigated but offer visibility into the runtime state of the system. The framework is intended to introduce people to the techniques and complexities associated with extracting digital artifacts from volatile memory samples and provide a platform for further work into this exciting area of research.
security/rekall-1.5.2 (Score: 5.4946377E-5)
Memory forensics analysis framework
The Rekall Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely independent of the system being investigated but offer visibility into the runtime state of the system. The framework is intended to introduce people to the techniques and complexities associated with extracting digital artifacts from volatile memory samples and provide a platform for further work into this exciting area of research.