Ports Search

Results 16,85116,860 of 17,660 for descr%3A%22spam filter%22.(0.318 seconds)
security/outguess-0.2 (Score: 8.118464E-5)
Steganographic tool
from the README: OutGuess is a universal steganographic tool that allows the insertion of hidden information into the redundant bits of data sources. The nature of the data source is irrelevant to the core of OutGuess. The program relies on data specific handlers that will extract redundant bits and write them back after modification. In this version the PNM and JPEG image formats are supported. The histogram utility is not installed by this port/package because it crashes.
security/Auth-YubikeyDecrypter-0.07 (Score: 8.118464E-5)
Decrypting the output from the yubikey token
Decrypt the output from the yubikey token The hardware can be found at http://www.yubico.com/home/index/ The decryption module does only one thing - decrypt the AES encrypted OTP from the Yubikey. To this, it requires the OTP, and the AES key. Please note - this module does not perform authentication - it is a required component to decrypt the token first before authentication can be performed.
security/Crypt-PKCS10-1.5 (Score: 8.118464E-5)
Parse PKCS
A small command line utility for parsing PKCS#10 certificate signing requests to perl data structure and provides accessor methods to supported elements. It is based on the generic ASN.1 module by Graham Barr and on the x509decode example by Norbert Klasen. It is also based upon the works of Duncan Segrests Crypt-X509-CRL module. The module parses common fields and extensions. Some fields might be missing.
security/authforce-0.9.9 (Score: 8.118464E-5)
HTTP authentication brute forcer
Authforce is an HTTP authentication brute forcer. Using various methods, it attempts brute force username and password pairs for a site. It has the ability to try common username and passwords, username derivations, and common username/password pairs. It is used to both test the security of your site and to prove the insecurity of HTTP authentication based on the fact that users just don't pick good passwords.
security/cisco-torch-0.4 (Score: 8.118464E-5)
Mass Cisco Vulnerability Scanner
Cisco-torch is a mass Cisco Vulnerability Scanner. The main feature that makes Cisco-torch different from similar tools is the extensive use of forking to launch multiple scanning processes on the background for maximum scanning efficiency. Also, it uses several methods of application layer fingerprinting simultaneously, if needed. We wanted something fast to discover remote Cisco hosts running Telnet, SSH, Web, NTP and SNMP services and launch dictionary attacks against the services discovered.
security/Digest-Pearson-1.00 (Score: 8.118464E-5)
Perl extension for Peter K. Pearson's hash algorithm
Digest::Pearson is an implementation of Peter K. Pearson's hash algorithm presented in "Fast Hashing of Variable Length Text Strings" - ACM 1990. This hashing technique yields good distribution of hashed results for variable length input strings on the range 0-255, and thus, it is well suited for data load balancing. The implementation is in C, so it is fast. If you prefer a pure Perl version and can tolerate slower speed, you might want to consider Digest::Pearson::PurePerl instead.
security/ike-scan-1.9 (Score: 8.118464E-5)
VPN scanner and identifier
ike-scan discovers IKE hosts and can also fingerprint them using the retransmission backoff pattern. ike-scan does two things: a) Discovery: Determine which hosts are running IKE. This is done by displaying those hosts which respond to the IKE requests sent by ike-scan. b) Fingerprinting: Determine which IKE implementation the hosts are using. This is done by recording the times of the IKE response packets from the target hosts and comparing the observed retransmission backoff pattern against known patterns.
security/john-1.7.9.j.7 (Score: 8.118464E-5)
Featureful Unix password cracker
John the Ripper is a fast password cracker, currently available for many flavors of Unix (eleven are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches (over 40 of additional hash and cipher types).
security/bsdsfv-1.18 (Score: 8.118464E-5)
Flexible SFV checksum utility
BSDsfv is a flexible and highly compatible SFV checksum utility. Features: - create SFV files, verify downloaded single files or whole releases - add banners to your SFV files - very flexible and compatible with all other SFV tools currently known, including SFVNIX compatibility mode concerning SFV files created - easy to console application - plug & play support for glFTPd and other demons including count-missing-files feature for race scripts
security/SHA-2.01 (Score: 8.118464E-5)
Perl5 interface to the SHA1 algorithm
The SHA module allows you to use the NIST SHA message digest algorithm from within Perl programs. The final message digest value is returned by the digest operation as a 20-byte binary string. This operation delivers the result of operations since the last new or reset operation. Once the operation has been performed, the context must be reset before being used to calculate another digest value.