Heimdal::Kadm5 is a Perl XS wrapper around the Heimdal Kerberos
administrative client library (libkadm5clnt). Heimdal is a free slightly
less export challenged implementation of Kerberos5 by Assar Westerlund and
Johan Danielsson. This module exposes the API used to administer a
Kerberos realm: add, remove, and list principals, create keytabs, change
keys, and similar operations.
This is a very simple snort rule object. It was developed to allow for
scripted dynamic rule creation. Ideally you could dynamically take a
list of bad hosts and build an array of snort rule objects from that
list. Then write that list using the string() method to a snort rules
file.
pdfcrack is a simple tool for recovering passwords (both owner and
user ones) from pdf-documents. It should be able to handle all
pdfs that uses the standard security handler but the pdf-parsing
routines are a bit of a quick hack so you might stumble across some
pdfs where the parser needs to be fixed to handle.
Pond is not email. Pond is forward secure, asynchronous messaging for the
discerning. Pond messages are asynchronous, but are not a record; they expire
automatically a week after they are received. Pond seeks to prevent leaking
traffic information against everyone except a global passive attacker.
Pond is experimental software! DO NOT USE IT FOR ANYTHING REAL!!!
Use security/gnupg instead.
This Python package is a high-level wrapper for Kerberos (GSSAPI) operations.
The goal is to avoid having to build a module that wraps the entire
Kerberos.framework, and instead offer a limited set of functions that do what is
needed for client/server Kerberos authentication based on
<http://www.ietf.org/rfc/rfc4559.txt>.
PySAML2 is a pure python implementation of SAML2. It contains all necessary
pieces for building a SAML2 service provider or an identity provider. The
distribution contains examples of both. Originally written to work in a WSGI
environment there are extensions that allow you to use it with other frameworks.
It will transparently hijack HTTP traffic on a network, watch for HTTPS links
and redirects, then map those links into either look-alike HTTP links or
homograph-similar HTTPS links. It also supports modes for supplying a
favicon which looks like a lock icon, selective logging, and session denial.
The python bindings for yara.
"YARA is a tool aimed at helping malware researchers to identify and classify
malware samples. With YARA you can create descriptions of malware families
based on textual or binary patterns contained on samples of those families.
Each description consists of a set of strings and a Boolean expression which
determines its logic."
Radamsa is a generic test case generator for robustness testing, aka a fuzzer.
It can be used to test how well a program can stand malformed and potentially
malicious inputs. It operates on given sample inputs and thus requires minimal
effort to set up.
Seahorse is a Gnome front end for GnuPG - the Gnu Privacy Guard program.
It is a tool for secure communications and data storage.
Data encryption and digital signature creation can easily
be performed through a GUI and Key Management operations
can easily be carried out through an intuitive interface.