Ports Search

Results 10,98110,990 of 17,754 for %E6%8E%A7%E5%88%B6%E5%8F%B0.(0.01 seconds)
security/ike-2.2.1 (Score: 7.3261835E-5)
Shrew Soft IKE daemon and client tools
This port contains the Shrew Soft IKE daemon and client tools. The software supports IKE V1 communications with an emphasis on client functionality. It was originally designed to complement a gateway running the ipsec-tools racoon daemon. The latest version offers a high level of compatibility with Cisco, Juniper, Zywall, Fortigate and many other commercial IPsec VPN gateways. For more information please visit ...
security/fragrouter-1.6 (Score: 7.3261835E-5)
Tool for testing network IDS implementations
Fragrouter is a program for routing network traffic in such a way as to elude most network intrusion detection systems. The attacks implemented correspond to those listed in the Secure Networks ``Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection'' paper of January, 1998.
security/openscep-0.4.2 (Score: 7.3261835E-5)
Open source scep server
OpenSCEP is an open source implementation of the SCEP protocol used by Cisco routers for certificate enrollment to build VPNs. It implements most of the draft specification. OpenSCEP includes a client and a server implementation, as well as some CGI programs to simplify certificate and revocation list management.
security/isnprober-1.02 (Score: 7.3261835E-5)
PenTest tool for TCP Initial Sequence Numbers research
-- ISNprober / Tom Vandepoel (Tom.Vandepoel@ubizen.com) -- ISNprober is a tool that samples TCP Initial Sequence Numbers or IP ID's and can use that information to determine if a set of IP addresses belong to the same TCP/IP stack (machine) or not.
security/keychain-2.8.2 (Score: 7.3261835E-5)
User-friendly front-end to ssh-agent(1)
Keychain is a shell script which acts as a user-friendly front-end to ssh-agent(1), allowing you to have one long-running ssh-agent process per system rather than per login session. Please study the documentation on the keychain website carefully since incorrect usage of this script may have certain security implications.
security/RSA-2.1.0.1 (Score: 7.3261835E-5)
Implementation of RSA, using the padding schemes of PKCS
This library implements the RSA encryption and signature algorithms for arbitrarily-sized ByteStrings. While the implementations work, they are not necessarily the fastest ones on the planet. Particularly key generation. The algorithms included are based of RFC 3447, or the Public-Key Cryptography Standard for RSA, version 2.1 (a.k.a, PKCS#1 v2.1).
security/afl-2.32 (Score: 7.3261835E-5)
Fast instrumented fuzzer
American fuzzy lop is a fuzzer that employs a novel type of compile-time instrumentation and genetic algorithms to automatically discover clean, interesting test cases that trigger new internal states in the targeted binary. This substantially improves the functional coverage for the fuzzed code.
security/pwstore-fast-2.4.4 (Score: 7.3261835E-5)
Secure password storage
To store passwords securely, they should be salted, then hashed with a slow hash function. This library uses PBKDF1-SHA256, and handles all the details. It uses the cryptohash package for speed; if you need a pure Haskell library, pwstore-purehaskell has the exact same API, but uses only pure Haskell. It is about 25 times slower than this package, but still quite usable.
security/arm-1.4.5.0 (Score: 7.3261835E-5)
Terminal status monitor for Tor
The anonymizing relay monitor (arm) is a terminal status monitor for Tor, intended for command-line aficionados, ssh connections, and anyone with a tty terminal. This works much like top does for system usage, providing real time statistics for: * bandwidth, cpu, and memory usage * relay's current configuration * logged events * connection details (ip, hostname, fingerprint, and consensus data) * ... etc
security/recog-2.0.22 (Score: 7.3261835E-5)
Framework for fingerprinting products
Recog is a framework for identifying products, services, operating systems, and hardware by matching fingerprints against data returned from various network probes. Recog makes it simply to extract useful information from web server banners, snmp system description fields, and a whole lot more.