from the README:
OutGuess is a universal steganographic tool that allows the insertion
of hidden information into the redundant bits of data sources. The
nature of the data source is irrelevant to the core of OutGuess. The
program relies on data specific handlers that will extract redundant
bits and write them back after modification. In this version the PNM
and JPEG image formats are supported.
The histogram utility is not installed by this port/package because
it crashes.
Decrypt the output from the yubikey token
The hardware can be found at
http://www.yubico.com/home/index/
The decryption module does only one thing - decrypt the AES encrypted
OTP from the Yubikey. To this, it requires the OTP, and the AES
key.
Please note - this module does not perform authentication - it is
a required component to decrypt the token first before authentication
can be performed.
A small command line utility for parsing PKCS#10 certificate signing
requests to perl data structure and provides accessor methods to
supported elements.
It is based on the generic ASN.1 module by Graham Barr and on the
x509decode example by Norbert Klasen. It is also based upon the
works of Duncan Segrests Crypt-X509-CRL module. The module parses
common fields and extensions. Some fields might be missing.
Authforce is an HTTP authentication brute forcer. Using various methods,
it attempts brute force username and password pairs for a site. It has
the ability to try common username and passwords, username derivations,
and common username/password pairs. It is used to both test the security
of your site and to prove the insecurity of HTTP authentication based on
the fact that users just don't pick good passwords.
Cisco-torch is a mass Cisco Vulnerability Scanner.
The main feature that makes Cisco-torch different from similar
tools is the extensive use of forking to launch multiple scanning
processes on the background for maximum scanning efficiency. Also,
it uses several methods of application layer fingerprinting simultaneously,
if needed. We wanted something fast to discover remote Cisco hosts running
Telnet, SSH, Web, NTP and SNMP services and launch dictionary attacks
against the services discovered.
Digest::Pearson is an implementation of Peter K. Pearson's hash algorithm
presented in "Fast Hashing of Variable Length Text Strings" - ACM 1990. This
hashing technique yields good distribution of hashed results for variable
length input strings on the range 0-255, and thus, it is well suited for
data load balancing.
The implementation is in C, so it is fast. If you prefer a pure Perl version
and can tolerate slower speed, you might want to consider
Digest::Pearson::PurePerl instead.
ike-scan discovers IKE hosts and can also fingerprint them using the
retransmission backoff pattern.
ike-scan does two things:
a) Discovery: Determine which hosts are running IKE.
This is done by displaying those hosts which respond to the IKE requests
sent by ike-scan.
b) Fingerprinting: Determine which IKE implementation the hosts are using.
This is done by recording the times of the IKE response packets from the
target hosts and comparing the observed retransmission backoff pattern
against known patterns.
John the Ripper is a fast password cracker, currently available for many
flavors of Unix (eleven are officially supported, not counting different
architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to
detect weak Unix passwords. Besides several crypt(3) password hash types
most commonly found on various Unix flavors, supported out of the box are
Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with
contributed patches (over 40 of additional hash and cipher types).
BSDsfv is a flexible and highly compatible SFV checksum utility.
Features:
- create SFV files, verify downloaded single files or whole releases
- add banners to your SFV files
- very flexible and compatible with all other SFV tools currently known,
including SFVNIX compatibility mode concerning SFV files created
- easy to console application
- plug & play support for glFTPd and other demons including
count-missing-files feature for race scripts
The SHA module allows you to use the NIST SHA message digest algorithm
from within Perl programs.
The final message digest value is returned by the digest operation as
a 20-byte binary string. This operation delivers the result of
operations since the last new or reset operation. Once the operation
has been performed, the context must be reset before being used to
calculate another digest value.