httprint is a web server fingerprinting tool. It relies on web server
characteristics to accurately identify web servers, despite the fact that they
may have been obfuscated by changing the server banner strings, or by plug-ins
such as mod_security or servermask. httprint can also be used to detect web
enabled devices which do not have a server banner string, such as wireless
access points, routers, switches, cable modems, etc. httprint uses text
signature strings and it is very easy to add signatures to the signature
database.
lsh is a client that can connect to the corresponding lshd server. It uses
the SECSH protocol, which means that it is compatible with SSH 2.0, except
for file transfer, which is not part of SECSH.
SECSH uses compression and encryption algorithms that are unencumbered, and
lsh itself is GPL.
lsh is not as feature-rich as OpenSSH, as it doesn't currently support
password-protected keyrings, the SSH 1.X protocols, TCP wrappers, etc.
On the other hand, it doesn't require OpenSSL, and doesn't take a lot of
work to avoid patented algorithms.
Port author's notes on usage and common problems can be found at
This module contains a simple S/Key calculator (as described in RFC
1760) implemented in Perl. It exports the function `key' by default, and
may optionally export the function `compute'.
`compute_md4', `compute_md5', `key_md4', and `key_md5' are provided as
convenience functions for selecting either MD4 or MD5 hashes. The
default is MD4; this may be changed with with the `$Crypt::SKey::HASH'
variable, assigning it the value of `MD4' or `MD5'. You can access any
of these functions by exporting them in the same manner as `compute' in
the above example.
Most S/Key systems use MD4 hashing, but a few (notably OPIE) use MD5.
This module allows easy access to GnuPG's key management, encryption and
signature functionality from Python programs, by interacting with GnuPG through
file descriptors. Input arguments are strictly checked and sanitised, and
therefore this module should be safe to use in networked applications requiring
direct user input. It is intended for use with Python 2.6 or greater.
This is a fork of python-gnupg-0.3.2, patched to fix a potential vulnerability
which could result in remote code execution, do to unsanitised inputs being
passed to subprocess.Popen([...], shell=True).
"gag" is a program to scan for "stacheldraht" agents, which are part
of an active "stacheldraht" network. It will not detect trinoo,
the original Tribe Flood Network (TFN), or TFN2K agents. For methods
of detecting trinoo and Tribe Flood Network, see:
http://staff.washington.edu/dittrich/misc/trinoo.analysis
http://staff.washington.edu/dittrich/misc/tfn.analysis
(Why "gag"? Its supposed to be a running joke I started in the trinoo
analysis. trinoo/trinot, "tribe"/civilize, gag/sicken&gesundheit!.
Read the ddos trilogy to find out!)
[ excerpt from developer's web site ]
I2P is an anonymous overlay network - a network within a network.
It is intended to protect communication from dragnet surveillance
and monitoring by third parties such as ISPs.
I2P is used by many people who care about their privacy: activists,
oppressed people, journalists and whistleblowers, as well as the
average person.
No network can be "perfectly anonymous". The continued goal of I2P
is to make attacks more and more difficult to mount. Its anonymity
will get stronger as the size of the network increases and with
ongoing academic review.
BSDstats is an attempt to produce reasonably accurate statistics on
deployments of BSD operating systems. This is useful for marketing,
project advocacy, hardware vendors and purchasers, device driver
maintainers, and port maintainers.
The major problem that we are trying to address is vendors who do not
feel that BSD operating systems present enough of a market to bother
supporting.
Meant to be run monthly or during bootup, this script submits
statistics anonymously to a central server (http://bsdstats.org).
Potentially sensitive details like IP addresses and hostnames are not
stored by or relayed through the BSDstats server.
A user-space utility for testing the memory subsystem for faults. It is
portable and should compile and work on any 32- or 64-bit Unix-like system.
(Yes, even weird, proprietary Unices, and even Mac OS X.) For hardware
developers, memtester can be told to test memory starting at a particular
physical address as of memtester version 4.1.0.
The original source was by Simon Kirby <sim@stormix.com>. The program has
been rewritten by Charles Cazabon and many additional tests were added to
help catch borderline memory. He also rewrote the original tests (which
catch mainly memory bits which are stuck permanently high or low) so that
they run approximately an order of magnitude faster.
`skill' is a program which sends signals to processes given
any combination of user names, ttys, commands, and pids. `snice' is
a program which changes the priority of processes (given the same).
It's actually one program which examines argv to determine what action
is to be taken on matching processes. It is similar to kill(1) and
renice(8), however the command line is completely order independent.
There are also verbose, search, and interactive modes of operation.
The name `skill' stems from `SuperKILL', but if you use it under `csh',
you may discover another reason for calling it `skill' (hint "s!!").
Tartarus provides a nice wrapper around basic Unix tools such as tar, find and
curl (well, that's not that basic) to provide a seamless backup solution,
aimed at automatic gathering and backup.
It has the ability to do full as well as incremental backups and is published
by Stefan Tomanek under the rules of the GPL.
Instead of relying on single usage backup scripts or complicated command lines,
tartarus reads its configuration from easily manageable configuration files.
It can store gathered data in regular files, or upload the backup directly (on
the fly) to an FTP server. For more specific usage scenarios, custom methods
can also be defined within the config file.